{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T01:06:27.235","vulnerabilities":[{"cve":{"id":"CVE-2001-0817","sourceIdentifier":"cve@mitre.org","published":"2001-12-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in HP-UX line printer daemon (rlpdaemon) in HP-UX 10.01 through 11.11 allows remote attackers to modify arbitrary files and gain root privileges via a certain print request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*","matchCriteriaId":"EDD9BE2B-7255-4FC1-B452-E8370632B03F"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/hp/2001-q4/0047.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-2001-32.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/m-021.shtml","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/638011","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/bid/3561","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/alerts/advise102.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7234","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/hp/2001-q4/0047.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-2001-32.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/m-021.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/638011","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/bid/3561","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/alerts/advise102.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}