Vulnerabilites related to sco - open_desktop
cve-1999-1185
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:02
Severity ?
EPSS score ?
Summary
Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/1379 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=90686250717719&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sco-openserver-mscreen-bo(1379)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1379" }, { "name": "19980926 Root exploit for SCO OpenServer.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1998-09-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sco-openserver-mscreen-bo(1379)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1379" }, { "name": "19980926 Root exploit for SCO OpenServer.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1185", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sco-openserver-mscreen-bo(1379)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1379" }, { "name": "19980926 Root exploit for SCO OpenServer.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1185", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1303
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:11
Severity ?
EPSS score ?
Summary
Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:02.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1303", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:02.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0019
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Delete or create a file via rpc.statd, due to invalid information.
References
▼ | URL | Tags |
---|---|---|
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/135 | vendor-advisory, x_refsource_SUN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:57.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "00135", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Delete or create a file via rpc.statd, due to invalid information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "00135", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0019", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Delete or create a file via rpc.statd, due to invalid information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "00135", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/135" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0019", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:57.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0033
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Command execution in Sun systems via buffer overflow in the at program.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:57.268Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Command execution in Sun systems via buffer overflow in the at program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T06:28:13", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Command execution in Sun systems via buffer overflow in the at program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0033", "datePublished": "2000-02-04T05:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:57.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0010
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
References
▼ | URL | Tags |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX | vendor-advisory, x_refsource_SGI | |
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980603-01-PX", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0010", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1305
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:11
Severity ?
EPSS score ?
Summary
Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:01.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1305", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:01.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0017
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.465Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T06:25:22", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0017", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0017", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.465Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0011
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
References
▼ | URL | Tags |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX | vendor-advisory, x_refsource_SGI | |
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 | vendor-advisory, x_refsource_HP | |
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 | vendor-advisory, x_refsource_SUN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980603-01-PX", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0011", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0345
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:34
Severity ?
EPSS score ?
Summary
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/archive/1/62170 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:34:51.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/62170" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T05:27:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/archive/1/62170" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0345", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.securityfocus.com/archive/1/62170", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/62170" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0345", "datePublished": "2000-02-04T05:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:34:51.895Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0307
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 05:14
Severity ?
EPSS score ?
Summary
Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and earlier allows an attacker to cause a denial of service which prevents access to reserved port numbers below 1024.
References
▼ | URL | Tags |
---|---|---|
ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b | vendor-advisory, x_refsource_SCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:20.964Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SB-99.07", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1999-06-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and earlier allows an attacker to cause a denial of service which prevents access to reserved port numbers below 1024." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SB-99.07", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0307", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and earlier allows an attacker to cause a denial of service which prevents access to reserved port numbers below 1024." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SB-99.07", "refsource": "SCO", "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0307", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2000-05-11T00:00:00", "dateUpdated": "2024-08-08T05:14:20.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0024
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
DNS cache poisoning via BIND, by predictable query IDs.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "DNS cache poisoning via BIND, by predictable query IDs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T06:26:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DNS cache poisoning via BIND, by predictable query IDs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0024", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1304
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:11
Severity ?
EPSS score ?
Summary
Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:01.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1304", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:01.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1302
Vulnerability from cvelistv5
Published
2001-09-12 04:00
Modified
2024-08-01 17:11
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://www.osvdb.org/8797 | vdb-entry, x_refsource_OSVDB | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7586 | vdb-entry, x_refsource_XF | |
http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:01.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "8797", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/8797" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "sco-pt_chmod(7586)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "name": "VB-94:01", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "8797", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/8797" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "sco-pt_chmod(7586)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "name": "VB-94:01", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "8797", "refsource": "OSVDB", "url": "http://www.osvdb.org/8797" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "sco-pt_chmod(7586)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "name": "VB-94:01", "refsource": "CERT", "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1302", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:01.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0128
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:57.581Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Oversized ICMP ping packets can result in a denial of service, aka Ping o\u0027 Death." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T06:43:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0128", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oversized ICMP ping packets can result in a denial of service, aka Ping o\u0027 Death." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0128", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:57.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1209
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-01 17:02
Severity ?
EPSS score ?
Summary
Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges.
References
▼ | URL | Tags |
---|---|---|
http://www.cert.org/vendor_bulletins/VB-97.14.scoterm | third-party-advisory, x_refsource_CERT | |
http://marc.info/?l=bugtraq&m=88131151000069&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/690 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.791Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VB-97.14", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/vendor_bulletins/VB-97.14.scoterm" }, { "name": "19971204 scoterm exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=88131151000069\u0026w=2" }, { "name": "sco-scoterm(690)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/690" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1997-11-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VB-97.14", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/vendor_bulletins/VB-97.14.scoterm" }, { "name": "19971204 scoterm exploit", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=88131151000069\u0026w=2" }, { "name": "sco-scoterm(690)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/690" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1209", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VB-97.14", "refsource": "CERT", "url": "http://www.cert.org/vendor_bulletins/VB-97.14.scoterm" }, { "name": "19971204 scoterm exploit", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=88131151000069\u0026w=2" }, { "name": "sco-scoterm(690)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/690" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1209", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.791Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0023
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.726Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Local user gains root privileges via buffer overflow in rdist, via lookup() function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T06:25:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0023", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Local user gains root privileges via buffer overflow in rdist, via lookup() function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0023", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0009
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
References
▼ | URL | Tags |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX | vendor-advisory, x_refsource_SGI | |
http://www.securityfocus.com/bid/134 | vdb-entry, x_refsource_BID | |
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 | vendor-advisory, x_refsource_HP | |
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 | vendor-advisory, x_refsource_SUN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "134", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/134" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "134", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/134" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980603-01-PX", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "134", "refsource": "BID", "url": "http://www.securityfocus.com/bid/134" }, { "name": "HPSBUX9808-083", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0009", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1162
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-01 17:02
Severity ?
EPSS score ?
Summary
Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.
References
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/542.php | vdb-entry, x_refsource_XF | |
http://www.cert.org/advisories/CA-1993-08.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sco-passwd-deny(542)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/542.php" }, { "name": "CA-1993-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1993-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-20T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sco-passwd-deny(542)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/542.php" }, { "name": "CA-1993-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sco-passwd-deny(542)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/542.php" }, { "name": "CA-1993-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-1993-08.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1162", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1138
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-01 17:02
Severity ?
EPSS score ?
Summary
SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/546 | vdb-entry, x_refsource_XF | |
http://www.cert.org/advisories/CA-1993-13.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sco-homedir(546)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "name": "CA-1993-13", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1993-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sco-homedir(546)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "name": "CA-1993-13", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sco-homedir(546)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "name": "CA-1993-13", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-1993-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1138", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
1996-12-18 05:00
Modified
2024-11-20 23:27
Severity ?
Summary
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
digital | osf_1 | 1.3.3 | |
ibm | aix | 3.2 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
linux | linux_kernel | 1.3.0 | |
linux | linux_kernel | 2.0 | |
sco | internet_faststart | 1.0 | |
sco | internet_faststart | 1.1 | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | openserver | 5.0.2 | |
sco | tcp_ip | 1.2.1 | |
sun | sunos | 5.4 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 | |
sun | sunos | 5.5.1 | |
ibm | sng | * | |
ibm | sng | 2.1 | |
ibm | sng | 2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:digital:osf_1:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "38BB277F-9761-40E9-8869-392C0B948AF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD1C3260-28D8-47C8-AB61-E2EA4ED2B1C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "61FEF2E3-1939-42B3-B32F-A22C173A186A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A95C1672-F798-44D2-94A1-19492C395FF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0169CBF5-9301-42D2-A6DA-73393BD986D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5783678F-80FA-4E1A-A637-7774CE3910EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*", "matchCriteriaId": "D1DEB967-BD3E-4CCF-B53F-3927454FA689", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "matchCriteriaId": "1C89DF53-2038-487A-A08F-8D705B7BFB27", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*", "matchCriteriaId": "C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:sng:*:*:*:*:*:*:*:*", "matchCriteriaId": "A852082C-D2F2-4F05-9A88-1FE5CA82912D", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC4577-5CC1-4099-8CBE-8AD5C1AF3807", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E223FC83-3079-4EB8-940F-5546DCD6F473", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oversized ICMP ping packets can result in a denial of service, aka Ping o\u0027 Death." } ], "id": "CVE-1999-0128", "lastModified": "2024-11-20T23:27:55.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1996-12-18T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1993-05-24 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cert.org/advisories/CA-1993-08.html | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.iss.net/security_center/static/542.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/advisories/CA-1993-08.html | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/542.php |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 1.1 | |
sco | open_desktop | 2.0 | |
sco | unix | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45809A38-B903-49CF-835A-A678A840B14D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB0CCDB1-0D44-4868-8CD6-7EACE691E1C2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system." } ], "id": "CVE-1999-1162", "lastModified": "2024-11-20T23:30:27.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1993-05-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/542.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/542.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1994-11-30 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1303", "lastModified": "2024-11-20T23:30:47.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1996-04-24 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Delete or create a file via rpc.statd, due to invalid information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
data_general | dg_ux | 4.11 | |
ncr | mp-ras | 2.03 | |
ncr | mp-ras | 3.0 | |
sgi | irix | 6.1 | |
ibm | aix | 3.2 | |
ibm | aix | 4.1 | |
nighthawk | cx_ux | * | |
nighthawk | powerux | * | |
sco | open_desktop | 2 | |
sco | open_desktop | 3 | |
sco | openserver | 3.0 | |
sco | openserver | 5.0 | |
sco | unixware | 2 | |
sun | sunos | 4.1.3 | |
sun | sunos | 4.1.4 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:data_general:dg_ux:4.11:*:*:*:*:*:*:*", "matchCriteriaId": "F008DEB7-9A49-43BB-8F37-809B5D398676", "vulnerable": true }, { "criteria": "cpe:2.3:a:ncr:mp-ras:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "E7039C60-B488-4A64-9532-EA1C9E175C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "28ADAFCA-AD99-40C7-B4C0-1BA5D3DB98F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "966C1A13-8007-408D-96BE-0DA3BB6CA401", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:nighthawk:cx_ux:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D964BE6-892C-4C22-A894-8143776DF8F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:nighthawk:powerux:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1E05E77-3B17-4177-A10E-CAE4809F81AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:2:*:*:*:*:*:*:*", "matchCriteriaId": "5724993B-7563-48C2-8BD1-25E4E57C6699", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3:*:*:*:*:*:*:*", "matchCriteriaId": "66086A58-91FC-4203-B2C2-4B3091A1C548", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7363FF35-7C67-40DC-AD38-74FD6264BF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2:*:*:*:*:*:*:*", "matchCriteriaId": "B8352832-11AE-4BE4-B996-AA90E755066B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "615FA6E4-4DE0-422A-9220-F747D95192C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1070749A-65E9-439A-A7CC-3CE529A5D5E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*", "matchCriteriaId": "D1DEB967-BD3E-4CCF-B53F-3927454FA689", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "matchCriteriaId": "1C89DF53-2038-487A-A08F-8D705B7BFB27", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Delete or create a file via rpc.statd, due to invalid information." } ], "id": "CVE-1999-0019", "lastModified": "2024-11-20T23:27:37.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1996-04-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/135" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-04-08 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:data_general:dg_ux:5.4_3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2EDB1993-75C9-4738-BDB3-E4433AC202FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:5.4_3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB15FBD9-B4F8-42EF-92C2-8D70A2385E3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:5.4_4.1:*:*:*:*:*:*:*", "matchCriteriaId": "AA109D17-268F-4E8A-BBA9-0EAA6B46A705", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:5.4_4.11:*:*:*:*:*:*:*", "matchCriteriaId": "59EFCFC1-A15C-4B8D-BCCE-DB401A50D23C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "8257C916-6F4D-4B7E-8EED-B2789B3B35AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DF8869C-2446-48F3-A1CD-70AE44D74EF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "199F4D8C-2FB9-4AF7-B7A3-339513665616", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "41D0212C-EA41-4DF3-9A93-4559545BCD7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "3567046C-FE3F-424D-A1B0-D7A43D00B79F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "40511481-CD42-4EB7-BE2A-7A78964B7D3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D926CDA1-AF2B-4DED-93AE-8F12091E0B23", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0B4722F-1FBA-4A73-BF85-5920B94F833D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.1t:*:*:*:*:*:*:*", "matchCriteriaId": "B7FD1CEC-9064-483C-A3C2-04E3C50EFBEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "05B1518A-9BBC-4CDB-8338-4DCC9A1A91D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "C26983FB-6FD7-4938-8025-E535A6505ADF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "52D01CD7-CE53-44D6-82C6-C72579BA089C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.4b:*:*:*:*:*:*:*", "matchCriteriaId": "73F04863-29CB-4E0C-838B-1C23E25C129C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.4t:*:*:*:*:*:*:*", "matchCriteriaId": "79AA794C-C18F-48A4-ADCB-DC219DF259CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "4D4B36C0-D3FF-4B33-B810-DB920062480B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5_iop:*:*:*:*:*:*:*", "matchCriteriaId": "C03CED73-9451-4DE4-A00A-7EAB24424CC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5_ipr:*:*:*:*:*:*:*", "matchCriteriaId": "29446761-8ACE-4E05-82C3-3FF77C1E2CCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "20B3C51E-DE28-4B50-B841-31CCFEA88A1C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5d:*:*:*:*:*:*:*", "matchCriteriaId": "A67E6C0C-F5A4-4591-94B9-3D72221C0933", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5e:*:*:*:*:*:*:*", "matchCriteriaId": "7CC66EB2-FFC7-4EF1-9591-A5C5E1E7C919", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5f:*:*:*:*:*:*:*", "matchCriteriaId": "85D02672-84E9-4036-8ED8-FE6EF4D7E275", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5g:*:*:*:*:*:*:*", "matchCriteriaId": "646483C9-6FFC-46FE-B9CD-40D733FABFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:4.0.5h:*:*:*:*:*:*:*", "matchCriteriaId": "C6B71C71-FA29-4B4C-831C-63AE2797BA2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "333103D5-71B8-4DC1-90F7-15F2841955D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A889C10-0637-4133-AFBD-533C8397BE89", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E292DA15-91BF-4957-9C0F-A69518538BED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "26144F94-63FD-4907-B548-09B68C2FC9B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "26309EFA-0991-46B6-9818-F0FBB902D5F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "966C1A13-8007-408D-96BE-0DA3BB6CA401", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "B2D59247-56FA-46B4-BB51-2DAE71AFC145", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD254562-D74A-4D7C-B846-E242D785B830", "vulnerable": true }, { "criteria": "cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BBFBCFEE-C24C-4D38-83F9-810E05D27901", "vulnerable": true }, { "criteria": "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "766851E2-134A-4A89-931B-6F1753525684", "vulnerable": true }, { "criteria": "cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "ABC52A20-B706-432D-9A15-45F48EB1B08B", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA7775-30F2-4CA0-BA6E-70ED12A48D90", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FB038A89-1CA6-4313-B7CE-56C894945FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "2B3BC86F-5718-4232-BFFF-6244A7C09B8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6118CC1-6E51-4E1B-8F58-43B337515222", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "F3D3B348-270F-4209-B31A-2B40F5E4A601", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "91D7C561-4D23-430B-A7D8-137E52B08FF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*", "matchCriteriaId": "BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DF613C9-DC4A-45F0-BEE1-8450762B0089", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "441CEF2E-9687-4930-8536-B8B83018BD28", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "55DD3C82-0B7D-4B25-B603-AD6C6D59239A", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC7A39CD-C4B2-4FD9-A450-E5C7A5480174", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9092D88-585D-4A0C-B181-E8D93563C74B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8211154-6685-4FF0-B3ED-43A5E5763A10", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "1530468C-EDEF-431D-9164-B0D670AF07D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "17439B5B-0B66-490B-9B53-2C9D576C879F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*", "matchCriteriaId": "54AF87E4-52A4-44CA-B48E-A5BB139E6410", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases." } ], "id": "CVE-1999-0009", "lastModified": "2024-11-20T23:27:35.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-04-08T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/134" }, { "source": "cve@mitre.org", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1997-08-13 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
DNS cache poisoning via BIND, by predictable query IDs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
isc | bind | 4.9.5 | |
isc | bind | 8.1 | |
bsdi | bsd_os | 2.1 | |
bsdi | bsd_os | 3.0 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
nec | asl_ux_4800 | 64 | |
nec | ews-ux_v | 4.2 | |
nec | ews-ux_v | 4.2mp | |
nec | up-ux_v | 4.2mp | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | unix | 3.2v4 | |
sco | unixware | 2.1 | |
sun | solaris | 2.4 | |
sun | solaris | 2.5 | |
sun | solaris | 2.5.1 | |
sun | solaris | 2.6 | |
sun | sunos | - | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB7F1274-7E0E-40C8-8006-ACFDBE757D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "766851E2-134A-4A89-931B-6F1753525684", "vulnerable": true }, { "criteria": "cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "99235B00-0050-42BF-99EF-FCDD72D8627D", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*", "matchCriteriaId": "BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFDDBA47-A0E3-4EB2-868A-A9B998B0154E", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*", "matchCriteriaId": "6CF54267-A293-44B1-BD9A-14CD39F732C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*", "matchCriteriaId": "875BE14D-96DC-4973-B077-40C7DFC75B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*", "matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DNS cache poisoning via BIND, by predictable query IDs." } ], "id": "CVE-1999-0024", "lastModified": "2024-11-20T23:27:38.463", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1997-08-13T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1997-06-12 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Command execution in Sun systems via buffer overflow in the at program.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "28ADAFCA-AD99-40C7-B4C0-1BA5D3DB98F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*", "matchCriteriaId": "056B3397-81A9-4128-9F49-ECEBE1743EE8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7363FF35-7C67-40DC-AD38-74FD6264BF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "4D1A26B2-C13B-42D8-8E91-0D4979641865", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*", "matchCriteriaId": "D1DEB967-BD3E-4CCF-B53F-3927454FA689", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "matchCriteriaId": "1C89DF53-2038-487A-A08F-8D705B7BFB27", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*", "matchCriteriaId": "C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Command execution in Sun systems via buffer overflow in the at program." }, { "lang": "es", "value": "Ejecuci\u00f3n de comandos en sistemas Sun mediante desbordamiento de tamp\u00f3n en el programa \u0027at\u0027" } ], "id": "CVE-1999-0033", "lastModified": "2024-11-20T23:27:39.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1997-06-12T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1996-07-24 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
inet | inet | 5.01 | |
inet | inet | 6.01 | |
bsdi | bsd_os | * | |
freebsd | freebsd | 2.0 | |
freebsd | freebsd | 2.0.5 | |
freebsd | freebsd | 2.1.0 | |
freebsd | freebsd | 2.2 | |
ibm | aix | 3.2 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
sco | internet_faststart | 1.0 | |
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | openserver | 2.0 | |
sco | openserver | 5.0 | |
sco | openserver | 5.0.2 | |
sco | tcp_ip | 1.2.0 | |
sco | tcp_ip | 1.2.1 | |
sco | unixware | 2.0 | |
sco | unixware | 2.1 | |
sun | sunos | - | |
sun | sunos | 4.1.3 | |
sun | sunos | 4.1.3u1 | |
sun | sunos | 4.1.4 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:inet:inet:5.01:*:*:*:*:*:*:*", "matchCriteriaId": "A680AE78-F1C0-4EA2-9D71-55F3EADA59C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:inet:inet:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "1919C12E-1448-4922-BDB1-E123CD23C446", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA7932DF-A035-4506-9BF1-C733DC5DD872", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "34797660-41F5-4358-B70F-2A40DE48F182", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C9E23D-AB82-4AE1-873E-C5493BB96AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "183667CA-6DF1-4BFB-AE32-9ABF55B7283A", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "61FEF2E3-1939-42B3-B32F-A22C173A186A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "5FAA3048-117B-4E69-8DFE-E96A343FB29A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "0169CBF5-9301-42D2-A6DA-73393BD986D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:tcp_ip:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB18BA3A-B2BB-4816-9223-5BFAAEBCC00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5783678F-80FA-4E1A-A637-7774CE3910EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "43D2F319-DF69-4E52-AF29-06DF1E312030", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "615FA6E4-4DE0-422A-9220-F747D95192C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "matchCriteriaId": "FD1BA107-F2D3-4F13-82EC-4576C429E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1070749A-65E9-439A-A7CC-3CE529A5D5E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Local user gains root privileges via buffer overflow in rdist, via lookup() function." } ], "id": "CVE-1999-0023", "lastModified": "2024-11-20T23:27:38.293", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1996-07-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-03-12 05:00
Modified
2024-11-20 23:32
Severity ?
Summary
Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and earlier allows an attacker to cause a denial of service which prevents access to reserved port numbers below 1024.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | * | |
sco | openserver | * | |
sco | unixware | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF5151F-D0FF-42E5-A45B-97E7AAADDE53", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D1B2F0A-834B-45F9-9127-520F1374C70F", "versionEndIncluding": "5.05", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B64BFE2D-88F0-4046-9D0C-96D215AD935E", "versionEndIncluding": "2.1.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in xserver in SCO UnixWare 2.1.x and OpenServer 5.05 and earlier allows an attacker to cause a denial of service which prevents access to reserved port numbers below 1024." } ], "id": "CVE-2000-0307", "lastModified": "2024-11-20T23:32:12.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-03-12T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-99.07b" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-10-06 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | cmw | 3.0 | |
sco | internet_faststart | all_versions | |
sco | open_desktop | 3.0 | |
sco | openserver | 3.0 | |
sco | openserver | 5.0 | |
sco | openserver_enterprise_system | 5.0.4p |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sco:cmw:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C28F3AC9-EC84-402B-987D-9F8891B81906", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:internet_faststart:all_versions:*:*:*:*:*:*:*", "matchCriteriaId": "BB2712AB-ABFB-4EEC-B07A-31B4025E8FEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7363FF35-7C67-40DC-AD38-74FD6264BF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:5.0.4p:*:*:*:*:*:*:*", "matchCriteriaId": "77B0A8C5-DAE1-468C-B8EC-05CF40C78695", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file." } ], "id": "CVE-1999-1185", "lastModified": "2024-11-20T23:30:30.707", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-10-06T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1379" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1994-11-30 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1305", "lastModified": "2024-11-20T23:30:47.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1997-11-20 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://marc.info/?l=bugtraq&m=88131151000069&w=2 | ||
cve@mitre.org | http://www.cert.org/vendor_bulletins/VB-97.14.scoterm | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/690 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=88131151000069&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/vendor_bulletins/VB-97.14.scoterm | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/690 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 3.0 | |
sco | openserver | 3.0 | |
sco | openserver | 5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7363FF35-7C67-40DC-AD38-74FD6264BF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges." } ], "id": "CVE-1999-1209", "lastModified": "2024-11-20T23:30:34.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1997-11-20T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=88131151000069\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/vendor_bulletins/VB-97.14.scoterm" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=88131151000069\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/vendor_bulletins/VB-97.14.scoterm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/690" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1994-11-30 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1302", "lastModified": "2024-11-20T23:30:47.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/8797" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/8797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-04-08 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
data_general | dg_ux | y2k_patchr4.11mu05 | |
data_general | dg_ux | y2k_patchr4.12mu03 | |
data_general | dg_ux | y2k_patchr4.20mu01 | |
data_general | dg_ux | y2k_patchr4.20mu02 | |
data_general | dg_ux | y2k_patchr4.20mu03 | |
isc | bind | 4.9 | |
isc | bind | 8 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
ibm | aix | 4.3 | |
nec | asl_ux_4800 | 11 | |
nec | asl_ux_4800 | 13 | |
netbsd | netbsd | 1.3 | |
netbsd | netbsd | 1.3.1 | |
redhat | linux | 4.2 | |
redhat | linux | 5.0 | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | unix | 3.2v4 | |
sco | unixware | 2.1 | |
sco | unixware | 7.0 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 | |
sun | sunos | 5.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*", "matchCriteriaId": "D85C6D97-CF88-4F47-8580-1E1271C3BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*", "matchCriteriaId": "803355A3-10BA-45DA-AFF7-867A06AEE420", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*", "matchCriteriaId": "59665BA5-0818-44E7-9102-62060C88431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*", "matchCriteriaId": "930A6977-EF72-4693-96E0-603FE096EB4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*", "matchCriteriaId": "BDE41F0D-8CCB-4A79-B05E-E08E37B1E15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49A7C6F2-F769-447A-8C8B-9002BD6FBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*", "matchCriteriaId": "7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*", "matchCriteriaId": "707579B5-701A-4A36-8567-AB2E11759322", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*", "matchCriteriaId": "E7C620CF-5046-4A6A-A479-AC315D1E36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "17439B5B-0B66-490B-9B53-2C9D576C879F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages." } ], "id": "CVE-1999-0010", "lastModified": "2024-11-20T23:27:36.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-04-08T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "cve@mitre.org", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1997-01-01 05:00
Modified
2024-11-20 23:28
Severity ?
Summary
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
freebsd | freebsd | 1.0 | |
freebsd | freebsd | 1.1 | |
freebsd | freebsd | 1.1.5.1 | |
freebsd | freebsd | 1.2 | |
freebsd | freebsd | 2.0 | |
freebsd | freebsd | 2.0.5 | |
ibm | aix | 3.2 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
sco | internet_faststart | 1.0 | |
sco | internet_faststart | 1.1 | |
sco | open_desktop | 3 | |
sco | openserver | 5 | |
sun | sunos | * | |
ibm | sng | 2.1 | |
ibm | sng | 2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "44EFD22E-02C9-4B80-8934-A9AC8DD858CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B1B4D4A5-25EB-48FE-BDFD-A274CE802648", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C496B665-70DA-4B98-A5D1-E2935C0CE840", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3A037F1-98AD-47CC-8D83-B42666E1B61E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "34797660-41F5-4358-B70F-2A40DE48F182", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "61FEF2E3-1939-42B3-B32F-A22C173A186A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A95C1672-F798-44D2-94A1-19492C395FF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3:*:*:*:*:*:*:*", "matchCriteriaId": "66086A58-91FC-4203-B2C2-4B3091A1C548", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5:*:*:*:*:*:*:*", "matchCriteriaId": "4EDA6C83-76C9-44F1-94A2-1CBCC7DBBB00", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FAC4577-5CC1-4099-8CBE-8AD5C1AF3807", "vulnerable": true }, { "criteria": "cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E223FC83-3079-4EB8-940F-5546DCD6F473", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems." } ], "id": "CVE-1999-0345", "lastModified": "2024-11-20T23:28:28.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1997-01-01T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/62170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/62170" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-04-08 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
data_general | dg_ux | y2k_patchr4.11mu05 | |
data_general | dg_ux | y2k_patchr4.12mu03 | |
data_general | dg_ux | y2k_patchr4.20mu01 | |
data_general | dg_ux | y2k_patchr4.20mu02 | |
data_general | dg_ux | y2k_patchr4.20mu03 | |
isc | bind | 4.9 | |
isc | bind | 8 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
ibm | aix | 4.3 | |
nec | asl_ux_4800 | 11 | |
nec | asl_ux_4800 | 13 | |
netbsd | netbsd | 1.3 | |
netbsd | netbsd | 1.3.1 | |
redhat | linux | 4.2 | |
redhat | linux | 5.0 | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | unix | 3.2v4 | |
sco | unixware | 2.1 | |
sco | unixware | 7.0 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 | |
sun | sunos | 5.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*", "matchCriteriaId": "D85C6D97-CF88-4F47-8580-1E1271C3BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*", "matchCriteriaId": "803355A3-10BA-45DA-AFF7-867A06AEE420", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*", "matchCriteriaId": "59665BA5-0818-44E7-9102-62060C88431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*", "matchCriteriaId": "930A6977-EF72-4693-96E0-603FE096EB4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*", "matchCriteriaId": "BDE41F0D-8CCB-4A79-B05E-E08E37B1E15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49A7C6F2-F769-447A-8C8B-9002BD6FBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*", "matchCriteriaId": "7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*", "matchCriteriaId": "707579B5-701A-4A36-8567-AB2E11759322", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*", "matchCriteriaId": "E7C620CF-5046-4A6A-A479-AC315D1E36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "17439B5B-0B66-490B-9B53-2C9D576C879F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer." } ], "id": "CVE-1999-0011", "lastModified": "2024-11-20T23:27:36.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-04-08T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" }, { "source": "cve@mitre.org", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1997-12-10 05:00
Modified
2024-11-20 23:27
Severity ?
Summary
FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | inet | 5.01 | |
gnu | inet | 6.01 | |
gnu | inet | 6.02 | |
washington_university | wu-ftpd | 2.4 | |
caldera | openlinux | 1.2 | |
freebsd | freebsd | 1.0 | |
freebsd | freebsd | 1.1 | |
freebsd | freebsd | 1.2 | |
freebsd | freebsd | 2.0 | |
freebsd | freebsd | 2.1.0 | |
freebsd | freebsd | 2.1.7 | |
ibm | aix | 3.2 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
ibm | aix | 4.3 | |
netbsd | netbsd | 1.0 | |
netbsd | netbsd | 1.1 | |
netbsd | netbsd | 1.2 | |
netbsd | netbsd | 1.2.1 | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0.4 | |
sco | unixware | 2.1 | |
siemens | reliant_unix | * | |
sun | sunos | 4.1.3u1 | |
sun | sunos | 4.1.4 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 | |
sun | sunos | 5.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*", "matchCriteriaId": "679EB37A-DC20-4EB0-BF1E-664BF53AC054", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:inet:6.01:*:*:*:*:*:*:*", "matchCriteriaId": "4AF8F484-F5AA-4834-B976-764B2488F377", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:inet:6.02:*:*:*:*:*:*:*", "matchCriteriaId": "C692D0C5-BCF4-4C68-B7DF-EDCE4A55F1B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "A86BB4F6-210F-448A-A3CB-127BEB5BD0D2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A5C77FA7-C977-4223-B6AC-91B82C45129C", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "44EFD22E-02C9-4B80-8934-A9AC8DD858CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B1B4D4A5-25EB-48FE-BDFD-A274CE802648", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F3A037F1-98AD-47CC-8D83-B42666E1B61E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "27C9E23D-AB82-4AE1-873E-C5493BB96AA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "CF4F7002-A525-4A66-BE8B-E50ABBF144B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DF613C9-DC4A-45F0-BEE1-8450762B0089", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "441CEF2E-9687-4930-8536-B8B83018BD28", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "55DD3C82-0B7D-4B25-B603-AD6C6D59239A", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FC7A39CD-C4B2-4FD9-A450-E5C7A5480174", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "035FBF8B-EB91-4211-9979-8A9E913A54A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:siemens:reliant_unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A2C5456-FF11-403E-B67E-5961278D812A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "matchCriteriaId": "FD1BA107-F2D3-4F13-82EC-4576C429E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1070749A-65E9-439A-A7CC-3CE529A5D5E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*", "matchCriteriaId": "D1DEB967-BD3E-4CCF-B53F-3927454FA689", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "matchCriteriaId": "1C89DF53-2038-487A-A08F-8D705B7BFB27", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*", "matchCriteriaId": "C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce." } ], "id": "CVE-1999-0017", "lastModified": "2024-11-20T23:27:37.323", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1997-12-10T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1993-09-17 04:00
Modified
2024-11-20 23:30
Severity ?
Summary
SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 1.0 | |
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver | 3.0 | |
sco | unix | system_v386_3.2_operating_system | |
sco | unix | system_v386_3.2_operating_system_2.0 | |
sco | unix | system_v386_3.2_operating_system_4.0 | |
sco | unix | system_v386_3.2_operating_system_4.x |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4624BE70-B14C-470A-B0ED-133FAE688882", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7363FF35-7C67-40DC-AD38-74FD6264BF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system:*:*:*:*:*:*:*", "matchCriteriaId": "BFE6762F-886D-4FC9-8AE5-C462BF42E403", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_2.0:*:*:*:*:*:*:*", "matchCriteriaId": "02948256-49AE-415E-8B64-27DA246B7A57", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1005628A-0E07-485C-9E88-353A86E83BD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.x:*:*:*:*:*:*:*", "matchCriteriaId": "207FB7B7-C6FF-4D9F-9E6D-34E6CF7E2146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable." } ], "id": "CVE-1999-1138", "lastModified": "2024-11-20T23:30:24.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1993-09-17T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1994-11-30 05:00
Modified
2024-11-20 23:30
Severity ?
Summary
Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1304", "lastModified": "2024-11-20T23:30:47.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }