All the vulnerabilites related to sco - unix
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
data_general | dg_ux | y2k_patchr4.11mu05 | |
data_general | dg_ux | y2k_patchr4.12mu03 | |
data_general | dg_ux | y2k_patchr4.20mu01 | |
data_general | dg_ux | y2k_patchr4.20mu02 | |
data_general | dg_ux | y2k_patchr4.20mu03 | |
isc | bind | 4.9 | |
isc | bind | 8 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
ibm | aix | 4.3 | |
nec | asl_ux_4800 | 11 | |
nec | asl_ux_4800 | 13 | |
netbsd | netbsd | 1.3 | |
netbsd | netbsd | 1.3.1 | |
redhat | linux | 4.2 | |
redhat | linux | 5.0 | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | unix | 3.2v4 | |
sco | unixware | 2.1 | |
sco | unixware | 7.0 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 | |
sun | sunos | 5.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*", "matchCriteriaId": "D85C6D97-CF88-4F47-8580-1E1271C3BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*", "matchCriteriaId": "803355A3-10BA-45DA-AFF7-867A06AEE420", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*", "matchCriteriaId": "59665BA5-0818-44E7-9102-62060C88431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*", "matchCriteriaId": "930A6977-EF72-4693-96E0-603FE096EB4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*", "matchCriteriaId": "BDE41F0D-8CCB-4A79-B05E-E08E37B1E15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49A7C6F2-F769-447A-8C8B-9002BD6FBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*", "matchCriteriaId": "7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*", "matchCriteriaId": "707579B5-701A-4A36-8567-AB2E11759322", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*", "matchCriteriaId": "E7C620CF-5046-4A6A-A479-AC315D1E36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "17439B5B-0B66-490B-9B53-2C9D576C879F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages." } ], "id": "CVE-1999-0010", "lastModified": "2024-11-20T23:27:36.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-04-08T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "cve@mitre.org", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
isc | bind | 4.9.5 | |
isc | bind | 8.1 | |
bsdi | bsd_os | 2.1 | |
bsdi | bsd_os | 3.0 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
nec | asl_ux_4800 | 64 | |
nec | ews-ux_v | 4.2 | |
nec | ews-ux_v | 4.2mp | |
nec | up-ux_v | 4.2mp | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | unix | 3.2v4 | |
sco | unixware | 2.1 | |
sun | solaris | 2.4 | |
sun | solaris | 2.5 | |
sun | solaris | 2.5.1 | |
sun | solaris | 2.6 | |
sun | sunos | - | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB7F1274-7E0E-40C8-8006-ACFDBE757D35", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "766851E2-134A-4A89-931B-6F1753525684", "vulnerable": true }, { "criteria": "cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "99235B00-0050-42BF-99EF-FCDD72D8627D", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*", "matchCriteriaId": "BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFDDBA47-A0E3-4EB2-868A-A9B998B0154E", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*", "matchCriteriaId": "6CF54267-A293-44B1-BD9A-14CD39F732C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*", "matchCriteriaId": "875BE14D-96DC-4973-B077-40C7DFC75B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*", "matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DNS cache poisoning via BIND, by predictable query IDs." } ], "id": "CVE-1999-0024", "lastModified": "2024-11-20T23:27:38.463", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1997-08-13T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1303", "lastModified": "2024-11-20T23:30:47.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 1.0 | |
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver | 3.0 | |
sco | unix | system_v386_3.2_operating_system | |
sco | unix | system_v386_3.2_operating_system_2.0 | |
sco | unix | system_v386_3.2_operating_system_4.0 | |
sco | unix | system_v386_3.2_operating_system_4.x |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4624BE70-B14C-470A-B0ED-133FAE688882", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7363FF35-7C67-40DC-AD38-74FD6264BF5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system:*:*:*:*:*:*:*", "matchCriteriaId": "BFE6762F-886D-4FC9-8AE5-C462BF42E403", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_2.0:*:*:*:*:*:*:*", "matchCriteriaId": "02948256-49AE-415E-8B64-27DA246B7A57", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1005628A-0E07-485C-9E88-353A86E83BD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.x:*:*:*:*:*:*:*", "matchCriteriaId": "207FB7B7-C6FF-4D9F-9E6D-34E6CF7E2146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable." } ], "id": "CVE-1999-1138", "lastModified": "2024-11-20T23:30:24.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1993-09-17T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1304", "lastModified": "2024-11-20T23:30:47.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sco | openserver | 5.0 | |
sco | unix | 3.2v4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file." } ], "id": "CVE-1999-1041", "lastModified": "2024-11-20T23:30:08.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-08-27T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/10420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/10420" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1302", "lastModified": "2024-11-20T23:30:47.527", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/8797" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/8797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
data_general | dg_ux | y2k_patchr4.11mu05 | |
data_general | dg_ux | y2k_patchr4.12mu03 | |
data_general | dg_ux | y2k_patchr4.20mu01 | |
data_general | dg_ux | y2k_patchr4.20mu02 | |
data_general | dg_ux | y2k_patchr4.20mu03 | |
isc | bind | 4.9 | |
isc | bind | 8 | |
ibm | aix | 4.1 | |
ibm | aix | 4.2 | |
ibm | aix | 4.3 | |
nec | asl_ux_4800 | 11 | |
nec | asl_ux_4800 | 13 | |
netbsd | netbsd | 1.3 | |
netbsd | netbsd | 1.3.1 | |
redhat | linux | 4.2 | |
redhat | linux | 5.0 | |
sco | open_desktop | 3.0 | |
sco | openserver | 5.0 | |
sco | unix | 3.2v4 | |
sco | unixware | 2.1 | |
sco | unixware | 7.0 | |
sun | sunos | 5.3 | |
sun | sunos | 5.4 | |
sun | sunos | 5.5 | |
sun | sunos | 5.5.1 | |
sun | sunos | 5.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*", "matchCriteriaId": "D85C6D97-CF88-4F47-8580-1E1271C3BEB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*", "matchCriteriaId": "803355A3-10BA-45DA-AFF7-867A06AEE420", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*", "matchCriteriaId": "59665BA5-0818-44E7-9102-62060C88431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*", "matchCriteriaId": "930A6977-EF72-4693-96E0-603FE096EB4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*", "matchCriteriaId": "BDE41F0D-8CCB-4A79-B05E-E08E37B1E15C", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*", "matchCriteriaId": "49A7C6F2-F769-447A-8C8B-9002BD6FBF6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*", "matchCriteriaId": "7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657", "vulnerable": true }, { "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*", "matchCriteriaId": "707579B5-701A-4A36-8567-AB2E11759322", "vulnerable": true }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*", "matchCriteriaId": "E7C620CF-5046-4A6A-A479-AC315D1E36BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81", "vulnerable": true }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*", "matchCriteriaId": "51756048-EB32-4A72-9ED4-937AF2B9DE37", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "17439B5B-0B66-490B-9B53-2C9D576C879F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer." } ], "id": "CVE-1999-0011", "lastModified": "2024-11-20T23:27:36.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-04-08T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" }, { "source": "cve@mitre.org", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 2.0 | |
sco | open_desktop | 3.0 | |
sco | open_desktop_lite | 3.0 | |
sco | openserver_enterprise_system | 3.0 | |
sco | openserver_network_system | 3.0 | |
sco | unix | * | |
sco | unix | 3.2 | |
sco | unix | 4.0 | |
sco | unix | 4.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5896E82-2CE0-41E1-B362-4AF7F760F7DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "109E66CC-D6A2-401C-A78F-7670DA0BF790", "versionEndIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7704187-37B1-454B-A928-257D401819BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA09A1EF-E03D-452E-AA80-0D8F294449FC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "id": "CVE-1999-1305", "lastModified": "2024-11-20T23:30:47.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1994-11-30T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "cve@mitre.org", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.cert.org/advisories/CA-1993-08.html | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.iss.net/security_center/static/542.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cert.org/advisories/CA-1993-08.html | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/542.php |
Vendor | Product | Version | |
---|---|---|---|
sco | open_desktop | 1.1 | |
sco | open_desktop | 2.0 | |
sco | unix | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sco:open_desktop:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "45809A38-B903-49CF-835A-A678A840B14D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB0CCDB1-0D44-4868-8CD6-7EACE691E1C2", "versionEndIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system." } ], "id": "CVE-1999-1162", "lastModified": "2024-11-20T23:30:27.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1993-05-24T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/542.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/542.php" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-1999-1302
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://www.osvdb.org/8797 | vdb-entry, x_refsource_OSVDB | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7586 | vdb-entry, x_refsource_XF | |
http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:01.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "8797", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/8797" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "sco-pt_chmod(7586)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "name": "VB-94:01", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "8797", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/8797" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "sco-pt_chmod(7586)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "name": "VB-94:01", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1302", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "8797", "refsource": "OSVDB", "url": "http://www.osvdb.org/8797" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "sco-pt_chmod(7586)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7586" }, { "name": "VB-94:01", "refsource": "CERT", "url": "http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1302", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:01.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0011
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX | vendor-advisory, x_refsource_SGI | |
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 | vendor-advisory, x_refsource_HP | |
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 | vendor-advisory, x_refsource_SUN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN", "x_transferred" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "tags": [ "vendor-advisory", "x_refsource_SUN" ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0011", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980603-01-PX", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" }, { "name": "00180", "refsource": "SUN", "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll\u0026doc=secbull/180" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0011", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.479Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX | vendor-advisory, x_refsource_SGI | |
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI", "x_transferred" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-03-02T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980603-01-PX", "tags": [ "vendor-advisory", "x_refsource_SGI" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980603-01-PX", "refsource": "SGI", "url": "ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX" }, { "name": "HPSBUX9808-083", "refsource": "HP", "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0010", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.711Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1138
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/546 | vdb-entry, x_refsource_XF | |
http://www.cert.org/advisories/CA-1993-13.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.798Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sco-homedir(546)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "name": "CA-1993-13", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1993-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-03-01T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sco-homedir(546)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "name": "CA-1993-13", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-1993-13.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sco-homedir(546)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/546" }, { "name": "CA-1993-13", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-1993-13.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1138", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.798Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0024
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "DNS cache poisoning via BIND, by predictable query IDs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T06:26:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0024", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DNS cache poisoning via BIND, by predictable query IDs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0024", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1304
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:01.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1304", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:01.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1162
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/542.php | vdb-entry, x_refsource_XF | |
http://www.cert.org/advisories/CA-1993-08.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:02:53.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "sco-passwd-deny(542)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/542.php" }, { "name": "CA-1993-08", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1993-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-20T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "sco-passwd-deny(542)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/542.php" }, { "name": "CA-1993-08", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-1993-08.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1162", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "sco-passwd-deny(542)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/542.php" }, { "name": "CA-1993-08", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-1993-08.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1162", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:02:53.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1303
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:02.681Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1303", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:02.681Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1041
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=90686250717719&w=2 | mailing-list, x_refsource_BUGTRAQ | |
ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a | vendor-advisory, x_refsource_SCO | |
http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen | third-party-advisory, x_refsource_CERT | |
http://www.securityfocus.com/archive/1/10420 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:55:29.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19980926 Root exploit for SCO OpenServer.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "name": "SB-98.05a", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a" }, { "name": "VB-98.10", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen" }, { "name": "19980827 SCO mscreen vul.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/10420" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1998-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19980926 Root exploit for SCO OpenServer.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "name": "SB-98.05a", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a" }, { "name": "VB-98.10", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen" }, { "name": "19980827 SCO mscreen vul.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/10420" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19980926 Root exploit for SCO OpenServer.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=90686250717719\u0026w=2" }, { "name": "SB-98.05a", "refsource": "SCO", "url": "ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a" }, { "name": "VB-98.10", "refsource": "CERT", "url": "http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen" }, { "name": "19980827 SCO mscreen vul.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/10420" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1041", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T16:55:29.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-1305
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | vendor-advisory, x_refsource_SCO | |
http://ciac.llnl.gov/ciac/bulletins/f-05.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:11:01.713Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "1994-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2001-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94:001", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-1305", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "94:001", "refsource": "SCO", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" }, { "name": "F-05", "refsource": "CIAC", "url": "http://ciac.llnl.gov/ciac/bulletins/f-05.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-1305", "datePublished": "2001-09-12T04:00:00", "dateReserved": "2001-08-31T00:00:00", "dateUpdated": "2024-08-01T17:11:01.713Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-199708-0008
Vulnerability from variot
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. McAfee Data Loss Prevention (DLP) is a set of data loss prevention solutions from McAfee. The solution protects intellectual property and ensures compliance by protecting the environment in which sensitive data resides (on-premise, in the cloud, or on the endpoint). Cross-site scripting vulnerabilities and cross-site request forgery vulnerabilities exist in McAfee DLP. When the user browses the affected website, his browser will execute any script code provided by the attacker, which may cause the attacker to steal cookie-based authentication, perform unauthorized operations, leak or modify sensitive information, or other forms may exist. s attack. Other attacks may also be possible
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-199708-0008", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": null }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "netware", "scope": "eq", "trust": 1.0, "vendor": "novell", "version": null }, { "model": "macos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": null }, { "model": "windows", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "irix", "scope": "eq", "trust": 1.0, "vendor": "sgi", "version": null }, { "model": "os2", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": null }, { "model": "aix", "scope": "eq", "trust": 1.0, "vendor": "ibm", "version": null }, { "model": "bsdos", "scope": "eq", "trust": 1.0, "vendor": "windriver", "version": null }, { "model": "tru64", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 1.0, "vendor": "hp", "version": null }, { "model": "unix", "scope": "eq", "trust": 1.0, "vendor": "sco", "version": null }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": null }, { "model": "kernel", "scope": null, "trust": 0.6, "vendor": "linux", "version": null }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.2" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.1" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2.0" }, { "model": "network data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "8.6" }, { "model": "network data loss prevention", "scope": "ne", "trust": 0.3, "vendor": "mcafee", "version": "9.3" } ], "sources": [ { "db": "BID", "id": "61811" }, { "db": "NVD", "id": "CVE-1999-0524" }, { "db": "CNNVD", "id": "CNNVD-199708-003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:netware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:windriver:bsdos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:os2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:tru64:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sco:sco_unix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sgi:irix:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-1999-0524" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ANZ Bank, BAE Systems, Graham Bell of Stratsec.Detica, Jamie Ooi, DirecTV, Xylinx, and Telstra", "sources": [ { "db": "BID", "id": "61811" }, { "db": "CNNVD", "id": "CNNVD-201308-265" } ], "trust": 0.9 }, "cve": "CVE-1999-0524", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-522", "impactScore": 0.0, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-1999-0524", "trust": 1.0, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-199708-003", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-522", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-522" }, { "db": "NVD", "id": "CVE-1999-0524" }, { "db": "CNNVD", "id": "CNNVD-199708-003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. McAfee Data Loss Prevention (DLP) is a set of data loss prevention solutions from McAfee. The solution protects intellectual property and ensures compliance by protecting the environment in which sensitive data resides (on-premise, in the cloud, or on the endpoint). \nCross-site scripting vulnerabilities and cross-site request forgery vulnerabilities exist in McAfee DLP. When the user browses the affected website, his browser will execute any script code provided by the attacker, which may cause the attacker to steal cookie-based authentication, perform unauthorized operations, leak or modify sensitive information, or other forms may exist. s attack. Other attacks may also be possible", "sources": [ { "db": "NVD", "id": "CVE-1999-0524" }, { "db": "CNNVD", "id": "CNNVD-201308-265" }, { "db": "BID", "id": "61811" }, { "db": "VULHUB", "id": "VHN-522" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "MCAFEE", "id": "SB10053", "trust": 2.0 }, { "db": "NVD", "id": "CVE-1999-0524", "trust": 1.7 }, { "db": "JUNIPER", "id": "JSA10705", "trust": 1.7 }, { "db": "OSVDB", "id": "95", "trust": 1.7 }, { "db": "BID", "id": "61811", "trust": 0.9 }, { "db": "CNNVD", "id": "CNNVD-199708-003", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201308-265", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-522" }, { "db": "BID", "id": "61811" }, { "db": "NVD", "id": "CVE-1999-0524" }, { "db": "CNNVD", "id": "CNNVD-199708-003" }, { "db": "CNNVD", "id": "CNNVD-201308-265" } ] }, "id": "VAR-199708-0008", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-522" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:28:35.912000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 }, { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-522" }, { "db": "NVD", "id": "CVE-1999-0524" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10053" }, { "trust": 1.7, "url": "http://descriptions.securescout.com/tc/11010" }, { "trust": 1.7, "url": "http://descriptions.securescout.com/tc/11011" }, { "trust": 1.7, "url": "http://www.osvdb.org/95" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/306" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/322" }, { "trust": 1.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10705" }, { "trust": 1.6, "url": "http://kb.vmware.com/selfservice/microsites/search.do?cmd=displaykc\u0026externalid=1434" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61811" }, { "trust": 0.3, "url": "http://www.mcafee.com/us/products/data-protection/data-loss-prevention.aspx" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10705" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10053" }, { "trust": 0.1, "url": "http://kb.vmware.com/selfservice/microsites/search.do?cmd=displaykc\u0026amp;externalid=1434" } ], "sources": [ { "db": "VULHUB", "id": "VHN-522" }, { "db": "BID", "id": "61811" }, { "db": "NVD", "id": "CVE-1999-0524" }, { "db": "CNNVD", "id": "CNNVD-199708-003" }, { "db": "CNNVD", "id": "CNNVD-201308-265" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-522" }, { "db": "BID", "id": "61811" }, { "db": "NVD", "id": "CVE-1999-0524" }, { "db": "CNNVD", "id": "CNNVD-199708-003" }, { "db": "CNNVD", "id": "CNNVD-201308-265" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "1997-08-01T00:00:00", "db": "VULHUB", "id": "VHN-522" }, { "date": "2013-08-13T00:00:00", "db": "BID", "id": "61811" }, { "date": "1997-08-01T04:00:00", "db": "NVD", "id": "CVE-1999-0524" }, { "date": "1997-08-01T00:00:00", "db": "CNNVD", "id": "CNNVD-199708-003" }, { "date": "2013-08-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-265" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-522" }, { "date": "2013-08-13T00:00:00", "db": "BID", "id": "61811" }, { "date": "2022-11-14T19:33:21.037000", "db": "NVD", "id": "CVE-1999-0524" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-199708-003" }, { "date": "2013-08-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201308-265" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-199708-003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux kernel Information disclosure vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-199708-003" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-199708-003" } ], "trust": 0.6 } }