{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T17:29:26.073","vulnerabilities":[{"cve":{"id":"CVE-1999-1395","sourceIdentifier":"cve@mitre.org","published":"1992-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1D42E089-9EE8-4B4E-8B25-20F54DA4D01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D2BFC6C5-9A3A-4A12-B7FD-095FD00DB89A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"8E8B4954-4B16-47D7-9BC2-49E8CE34BC31"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1:*:*:*:*:*:*:*","matchCriteriaId":"BFB8258A-966B-4E25-9824-1A73F1AEF265"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"EC967A85-49C7-4F1E-912F-E63363355ED3"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"00A32138-FC94-4AE6-A0E8-B359F15CFC37"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1b:*:*:*:*:*:*:*","matchCriteriaId":"3B94A8E5-1BC9-42AC-9176-7270352C1275"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.2:*:*:*:*:*:*:*","matchCriteriaId":"1E3CA2B4-63C9-4BBB-AD43-B54AEDB2039D"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"855536B6-B857-4721-BC1C-07FF6F309F34"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3:*:*:*:*:*:*:*","matchCriteriaId":"DF157514-2080-4A16-BEBA-AFF6FCEE52E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"93468C27-04EC-4C81-816E-2E44D2C9372C"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C0B611AE-9581-41E5-8AD8-7876EAA730A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4:*:*:*:*:*:*:*","matchCriteriaId":"74642EFA-4E4B-4BA9-A1AA-5CF4DD659A1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"3A418295-3389-40B9-9D96-5DE7B720D12B"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4.2:*:*:*:*:*:*:*","matchCriteriaId":"178FBBB2-222C-4456-835E-2CFD94222154"}]}]}],"references":[{"url":"http://osvdb.org/59332","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-18.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-92.16.VMS.Monitor.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7136.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/51","source":"cve@mitre.org"},{"url":"http://osvdb.org/59332","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1992-18.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-92.16.VMS.Monitor.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7136.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/51","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}