{"resultsPerPage":100,"startIndex":0,"totalResults":345558,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:40:21.122","vulnerabilities":[{"cve":{"id":"CVE-1999-0095","sourceIdentifier":"cve@mitre.org","published":"1988-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The debug command in Sendmail is enabled, allowing attackers to execute commands as root."},{"lang":"es","value":"El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:5.58:*:*:*:*:*:*:*","matchCriteriaId":"1D07F493-9C8D-44A4-8652-F28B46CBA27C"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/195","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1","source":"cve@mitre.org"},{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/195","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0082","sourceIdentifier":"cve@mitre.org","published":"1988-11-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CWD ~root command in ftpd allows root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ftp:ftp:*:*:*:*:*:*:*:*","matchCriteriaId":"30D7F58F-4C55-4D19-984C-79B6C9525BEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ftpcd:ftpcd:*:*:*:*:*:*:*:*","matchCriteriaId":"1D85A7F5-C187-4707-8681-F96A91F58318"}]}]}],"references":[{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"cve@mitre.org"},{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1471","sourceIdentifier":"cve@mitre.org","published":"1989-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in passwd in BSD based operating systems 4.3 and earlier allows local users to gain root privileges by specifying a long shell or GECOS field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*","matchCriteriaId":"32E0E862-63E6-42DA-8CCC-AAAC581FE211"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*","matchCriteriaId":"388BB5C2-53B3-4597-913C-7D86E585CCD5"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1989-01.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7152.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/4","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1989-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7152.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1122","sourceIdentifier":"cve@mitre.org","published":"1989-07-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in restore in SunOS 4.0.3 and earlier allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.3","matchCriteriaId":"8ABF98B1-CBDE-4E12-8F3F-9D9E22E72236"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1989-02.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/ciac-08.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/3","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6695","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1989-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/ciac-08.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6695","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1467","sourceIdentifier":"cve@mitre.org","published":"1989-10-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in rcp on SunOS 4.0.x allows remote attackers from trusted hosts to execute arbitrary commands as root, possibly related to the configuration of the nobody user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1989-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/5","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3165","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1989-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3165","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1506","sourceIdentifier":"cve@mitre.org","published":"1990-01-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in SMI Sendmail 4.0 and earlier, on SunOS up to 4.0.3, allows remote attackers to access user bin."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*","matchCriteriaId":"BDE2EAC5-0657-48FD-B4F8-D2DB6AABAE4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-90.01.sun.sendmail.vulnerability","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/6","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-90.01.sun.sendmail.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0084","sourceIdentifier":"cve@mitre.org","published":"1990-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*","matchCriteriaId":"A53226D2-00D1-4D69-AF1A-A9EBD5B7DE5F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0388","sourceIdentifier":"cve@mitre.org","published":"1990-05-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD libmytinfo library allows local users to execute commands via a long TERMCAP environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"}]}]}],"references":[{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A17.libmytinfo.asc","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1185","source":"cve@mitre.org"},{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A17.libmytinfo.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1185","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0209","sourceIdentifier":"cve@mitre.org","published":"1990-08-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SunView (SunTools) selection_svc facility allows remote users to read files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*","matchCriteriaId":"BDE2EAC5-0657-48FD-B4F8-D2DB6AABAE4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/8","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/8","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1198","sourceIdentifier":"cve@mitre.org","published":"1990-10-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0","matchCriteriaId":"AB5B9086-EC83-47C1-985A-7C088C84D858"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7141.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/11","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7141.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/11","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1391","sourceIdentifier":"cve@mitre.org","published":"1990-10-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EB8A63B4-195D-4AF0-8FE9-EB882BFF098E"},{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:1.0a:*:*:*:*:*:*:*","matchCriteriaId":"CB1D6AD5-9F62-496F-BF5A-7AE26ABC3D3C"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7143.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/10","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7143.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/10","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1392","sourceIdentifier":"cve@mitre.org","published":"1990-10-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges."},{"lang":"es","value":"Vulnerabilidad en el script de instalación restore0.9  en  NeXT 1.0a y 1.0 permite a usuarios locales conseguir privilegios de root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:nex:1.0a:*:*:*:*:*:*:*","matchCriteriaId":"B477FD08-1821-4825-845F-954665A264AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EB8A63B4-195D-4AF0-8FE9-EB882BFF098E"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7144.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/9","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7144.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1057","sourceIdentifier":"cve@mitre.org","published":"1990-10-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VMS 4.0 through 5.3 allows local users to gain privileges via the ANALYZE/PROCESS_DUMP dcl command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:vms:*:*:*:*:*:*:*:*","versionEndIncluding":"5.3","matchCriteriaId":"FC6FCF3E-910B-44F0-A946-BCC90308222E"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-04.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7137.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/12","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-04.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7137.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/12","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1554","sourceIdentifier":"cve@mitre.org","published":"1990-10-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"/usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*","matchCriteriaId":"41D0212C-EA41-4DF3-9A93-4559545BCD7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3567046C-FE3F-424D-A1B0-D7A43D00B79F"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1990-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3164.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/13","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3164.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/13","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1197","sourceIdentifier":"cve@mitre.org","published":"1990-12-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TIOCCONS in SunOS 4.1.1 does not properly check the permissions of a user who tries to redirect console output and input, which could allow a local user to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1990-12.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7140.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/14","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1990-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7140.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/14","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1115","sourceIdentifier":"cve@mitre.org","published":"1990-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the /etc/suid_exec program in HP Apollo Domain/OS sr10.2 and sr10.3 beta, related to the Korn Shell (ksh)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:apollo_domain_os:*:beta:*:*:*:*:*:*","versionEndIncluding":"sr10.3","matchCriteriaId":"F327CEF7-6EDD-4BA2-A60D-AC96588A824F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:apollo_domain_os:sr10.2:*:*:*:*:*:*:*","matchCriteriaId":"8B3564F9-ACAE-4E98-BE5D-912B257C93B1"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1990-04.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/a-30.shtml","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/6721.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/7","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1990-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/a-30.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/6721.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/7","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1258","sourceIdentifier":"cve@mitre.org","published":"1991-01-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.pwdauthd in SunOS 4.1.1 and earlier does not properly prevent remote access to the daemon, which allows remote attackers to obtain sensitive system information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/102","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1782","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/102","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1782","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1438","sourceIdentifier":"cve@mitre.org","published":"1991-02-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in /bin/mail in SunOS 4.1.1 and earlier allows local users to gain root privileges via certain command line arguments."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/105","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-91.01a.SunOS.mail.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/15","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/105","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-91.01a.SunOS.mail.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/15","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1211","sourceIdentifier":"cve@mitre.org","published":"1991-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in in.telnetd in SunOS 4.1.1 and earlier allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1212","sourceIdentifier":"cve@mitre.org","published":"1991-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in in.rlogind in SunOS 4.0.3 and 4.0.3c allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1194","sourceIdentifier":"cve@mitre.org","published":"1991-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"chroot in Digital Ultrix 4.1 and 4.0 is insecurely installed, which allows local users to gain privileges."},{"lang":"es","value":"chroot en Digital Ultrix 4.1 y 4.0 es instalado de forma insegura, lo que permite a usuarios locales para ganar privilegios."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"18EE0235-30CD-4104-ADB8-45AA5B3CBC3A"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"0699893A-AE83-4605-BF2B-FC0C17BF2A69"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-05.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/17","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/577","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/17","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/577","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1193","sourceIdentifier":"cve@mitre.org","published":"1991-05-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The \"me\" user in NeXT NeXTstep 2.1 and earlier has wheel group privileges, which could allow the me user to use the su command to become root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1","matchCriteriaId":"ACE9BEA7-5F68-4861-B7F8-7C9A8889DBAB"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/20","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/581","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/20","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/581","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1123","sourceIdentifier":"cve@mitre.org","published":"1991-05-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of Sun Source (sunsrc) tapes allows local users to gain root privileges via setuid root programs (1) makeinstall or (2) winstall."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/107&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1991-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/21","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/22","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/582","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/107&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1991-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/21","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/22","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/582","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1034","sourceIdentifier":"cve@mitre.org","published":"1991-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in login in AT&T System V Release 4 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:att:svr4:4.0:*:*:*:*:*:*:*","matchCriteriaId":"6F6554C4-666E-42A0-87B2-50F28CE58997"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/b-28.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/23","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/583","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/b-28.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/23","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/583","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1415","sourceIdentifier":"cve@mitre.org","published":"1991-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in /usr/bin/mail in DEC ULTRIX before 4.2 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"CFE03320-C658-48BC-93BA-B15DA5A29E3A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-91.13.Ultrix.mail.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/27","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-91.13.Ultrix.mail.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/27","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1090","sourceIdentifier":"cve@mitre.org","published":"1991-09-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an \"ftp=yes\" line, which allows remote attackers to read and modify arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*","matchCriteriaId":"5CA584DD-D936-4EA3-A6E6-D39763480191"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-15.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1844","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-15.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1844","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0498","sourceIdentifier":"cve@mitre.org","published":"1991-09-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TFTP is not running in a restricted directory, allowing a remote attacker to access sensitive information such as password files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0498","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0498","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1468","sourceIdentifier":"cve@mitre.org","published":"1991-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:2.0:*:*:*:*:*:*:*","matchCriteriaId":"EE2FFB2A-88AD-483E-ABE8-38655528F081"},{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:2.1:*:*:*:*:*:*:*","matchCriteriaId":"4BB7B0B4-2E69-434C-BB18-4400001A9CBC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*","matchCriteriaId":"41D0212C-EA41-4DF3-9A93-4559545BCD7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3567046C-FE3F-424D-A1B0-D7A43D00B79F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"40511481-CD42-4EB7-BE2A-7A78964B7D3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D926CDA1-AF2B-4DED-93AE-8F12091E0B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.0:*:*:*:*:*:*:*","matchCriteriaId":"3E7725DD-085A-4D3A-8F9E-55C3D4BBDD1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.0e:*:*:*:*:*:*:*","matchCriteriaId":"544736F7-0E4F-45C1-811B-114CFCBBC895"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACCD6F58-9E37-40F0-AFD5-49523BEA301E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1psr_a:*:*:*:*:*:*:*","matchCriteriaId":"FF90C17C-5B10-45D4-8296-D00EAFA1EB8E"}]}]}],"references":[{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-91.20.rdist.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7160.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8106","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/31","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-91.20.rdist.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7160.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8106","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/31","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0167","sourceIdentifier":"cve@mitre.org","published":"1991-12-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0167","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0167","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1493","sourceIdentifier":"cve@mitre.org","published":"1991-12-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in crp in Hewlett Packard Apollo Domain OS SR10 through SR10.3 allows remote attackers to gain root privileges via insecure system calls, (1) pad_$dm_cmd and (2) pad_$def_pfk()."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:apollo_domain_os:*:*:*:*:*:*:*:*","versionEndIncluding":"sr10.3","matchCriteriaId":"976B0F09-89B1-45AA-A8F2-CA473ECDB300"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-23.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/34","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7158","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-23.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/34","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7158","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1032","sourceIdentifier":"cve@mitre.org","published":"1991-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in LAT/Telnet Gateway (lattelnet) on Ultrix 4.1 and 4.2 allows attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"0699893A-AE83-4605-BF2B-FC0C17BF2A69"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"08B83DF0-860D-4A8C-ACA7-A1A68D81B8DB"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-36.shtml","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-11.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/26","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/584","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-36.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1991-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/26","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/584","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1059","sourceIdentifier":"cve@mitre.org","published":"1992-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in rexec daemon (rexecd) in AT&T TCP/IP 4.0 for various SVR4 systems allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:att:svr4:4.0:*:*:*:*:*:*:*","matchCriteriaId":"6F6554C4-666E-42A0-87B2-50F28CE58997"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-04.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3159.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/36","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3159.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/36","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0627","sourceIdentifier":"cve@mitre.org","published":"1992-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rexd service is running, which uses weak authentication that can allow an attacker to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The rexd service is an unsecured protocol for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-1121","sourceIdentifier":"cve@mitre.org","published":"1992-03-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration for UUCP in AIX before 3.2 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2","matchCriteriaId":"7984C6CE-B4DB-4863-93FB-799BD0BE589A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/891","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/38","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/554","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/891","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/38","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/554","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0117","sourceIdentifier":"cve@mitre.org","published":"1992-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX passwd allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0117","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0117","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1119","sourceIdentifier":"cve@mitre.org","published":"1992-04-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP installation script anon.ftp in AIX insecurely configures anonymous FTP, which allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:32-bit:*:*:*:*:*","matchCriteriaId":"EA45EFBA-7900-4277-9177-2D2A8316577D"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-09.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/41","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3154","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-09.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/41","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3154","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1142","sourceIdentifier":"cve@mitre.org","published":"1992-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS 4.1.2 and earlier allows local users to gain privileges via \"LD_*\" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.2","matchCriteriaId":"B756EC9D-B72C-4A5F-9C17-A2F73583B7D2"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-11.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3152","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1992-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3152","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0168","sourceIdentifier":"cve@mitre.org","published":"1992-06-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place.  For example, NFS file systems could be mounted through the portmapper despite export restrictions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0214","sourceIdentifier":"cve@mitre.org","published":"1992-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service by sending forged ICMP unreachable packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0214","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0214","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1396","sourceIdentifier":"cve@mitre.org","published":"1992-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in integer multiplication emulation code on SPARC architectures for SunOS 4.1 through 4.1.2 allows local users to gain root access or cause a denial of service (crash)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7150.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/49","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7150.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/49","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1395","sourceIdentifier":"cve@mitre.org","published":"1992-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1D42E089-9EE8-4B4E-8B25-20F54DA4D01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D2BFC6C5-9A3A-4A12-B7FD-095FD00DB89A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"8E8B4954-4B16-47D7-9BC2-49E8CE34BC31"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1:*:*:*:*:*:*:*","matchCriteriaId":"BFB8258A-966B-4E25-9824-1A73F1AEF265"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"EC967A85-49C7-4F1E-912F-E63363355ED3"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"00A32138-FC94-4AE6-A0E8-B359F15CFC37"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1b:*:*:*:*:*:*:*","matchCriteriaId":"3B94A8E5-1BC9-42AC-9176-7270352C1275"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.2:*:*:*:*:*:*:*","matchCriteriaId":"1E3CA2B4-63C9-4BBB-AD43-B54AEDB2039D"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"855536B6-B857-4721-BC1C-07FF6F309F34"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3:*:*:*:*:*:*:*","matchCriteriaId":"DF157514-2080-4A16-BEBA-AFF6FCEE52E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"93468C27-04EC-4C81-816E-2E44D2C9372C"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C0B611AE-9581-41E5-8AD8-7876EAA730A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4:*:*:*:*:*:*:*","matchCriteriaId":"74642EFA-4E4B-4BA9-A1AA-5CF4DD659A1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"3A418295-3389-40B9-9D96-5DE7B720D12B"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4.2:*:*:*:*:*:*:*","matchCriteriaId":"178FBBB2-222C-4456-835E-2CFD94222154"}]}]}],"references":[{"url":"http://osvdb.org/59332","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-18.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-92.16.VMS.Monitor.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7136.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/51","source":"cve@mitre.org"},{"url":"http://osvdb.org/59332","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1992-18.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-92.16.VMS.Monitor.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7136.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/51","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1306","sourceIdentifier":"cve@mitre.org","published":"1992-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*","versionEndIncluding":"9.1","matchCriteriaId":"91986F0D-94E5-4ED9-A98D-123C99FD43CE"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]}]}},{"cve":{"id":"CVE-1999-1466","sourceIdentifier":"cve@mitre.org","published":"1992-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the \"established\" keyword."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*","matchCriteriaId":"E72B3032-154D-45C2-8380-CCB28E4F2E8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*","matchCriteriaId":"87395248-5E9C-4257-9CC7-2E2805B69F83"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*","matchCriteriaId":"A476BFB0-E587-41A6-B691-2609E0146C2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*","matchCriteriaId":"2E9A00D5-A594-4C64-B982-10CB4C554F51"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/53","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/53","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1021","sourceIdentifier":"cve@mitre.org","published":"1992-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 bits in a 32 bit UID, which allows a local user to gain root access if the lower 16 bits are set to 0, as fixed by the NFS jumbo patch upgrade."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/117&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/47","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/117&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/47","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1056","sourceIdentifier":"cve@mitre.org","published":"1992-12-31T05:00:00.000","lastModified":"2023-11-07T01:55:06.290","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-1395.  Reason: This candidate is a duplicate of CVE-1999-1395.  Notes: All CVE users should reference CVE-1999-1395 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0312","sourceIdentifier":"cve@mitre.org","published":"1993-01-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP ypbind allows attackers with root privileges to modify NIS data."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0312","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0312","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1507","sourceIdentifier":"cve@mitre.org","published":"1993-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1psr_a:*:*:*:*:*:*:*","matchCriteriaId":"FF90C17C-5B10-45D4-8296-D00EAFA1EB8E"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-03.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/59","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/521","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-03.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/59","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/521","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1218","sourceIdentifier":"cve@mitre.org","published":"1993-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in finger in Commodore Amiga UNIX 2.1p2a and earlier allows local users to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:commodore:amiga_unix:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1p2a","matchCriteriaId":"86CE2F2F-EB73-42C3-9341-9E0F363C2016"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-04.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/522","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/522","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1312","sourceIdentifier":"cve@mitre.org","published":"1993-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in DEC OpenVMS VAX 5.5-2 through 5.0, and OpenVMS AXP 1.0, allows local users to gain system privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms_axp:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F14BE7DD-8FE0-47DC-929A-35F20D9E3CE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms_vax:*:*:*:*:*:*:*:*","versionEndIncluding":"5.5.2","matchCriteriaId":"52FE6481-1AEF-4C90-800C-AB5C4FB34344"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-05.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7142","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7142","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1216","sourceIdentifier":"cve@mitre.org","published":"1993-04-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the \"no ip source-route\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*","versionEndIncluding":"9.17","matchCriteriaId":"990D0766-8FDF-43A0-B46C-09F2E75B4760"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:8.2:*:*:*:*:*:*:*","matchCriteriaId":"70C8F944-01A5-45E8-B963-E68B85F86165"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:8.3:*:*:*:*:*:*:*","matchCriteriaId":"DE7D0623-0F18-4486-B4DF-B49635A70EDF"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:9.0:*:*:*:*:*:*:*","matchCriteriaId":"9EA7D7D0-B445-4F24-A86E-569291EA2456"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:9.1:*:*:*:*:*:*:*","matchCriteriaId":"27604364-99CA-4942-ABCD-8F2B4CB20092"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/d-15.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1993-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/541","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/d-15.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1993-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/541","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1162","sourceIdentifier":"cve@mitre.org","published":"1993-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:1.1:*:*:*:*:*:*:*","matchCriteriaId":"45809A38-B903-49CF-835A-A678A840B14D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"AB0CCDB1-0D44-4868-8CD6-7EACE691E1C2"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/542.php","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/542.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0124","sourceIdentifier":"cve@mitre.org","published":"1993-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_minnesota:gopherd:*:*:*:*:*:*:*:*","matchCriteriaId":"B2332AA3-6412-470A-A321-91EE3B95325F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0124","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0124","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1215","sourceIdentifier":"cve@mitre.org","published":"1993-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.0:*:*:*:*:*:*:*","matchCriteriaId":"98DA9E1F-E489-4D63-9CCA-6C011E6B08C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.01:*:*:*:*:*:*:*","matchCriteriaId":"76536FFE-4745-4F8D-A1E3-337FF5ED1F20"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/d-21.shtml","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-12.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/545","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/d-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1993-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/545","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1138","sourceIdentifier":"cve@mitre.org","published":"1993-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4624BE70-B14C-470A-B0ED-133FAE688882"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system:*:*:*:*:*:*:*","matchCriteriaId":"BFE6762F-886D-4FC9-8AE5-C462BF42E403"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_2.0:*:*:*:*:*:*:*","matchCriteriaId":"02948256-49AE-415E-8B64-27DA246B7A57"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.0:*:*:*:*:*:*:*","matchCriteriaId":"1005628A-0E07-485C-9E88-353A86E83BD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.x:*:*:*:*:*:*:*","matchCriteriaId":"207FB7B7-C6FF-4D9F-9E6D-34E6CF7E2146"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-13.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/546","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-13.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/546","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1318","sourceIdentifier":"cve@mitre.org","published":"1993-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.3","matchCriteriaId":"EB4CA8D0-B4E3-4B4E-A7D0-771B5C405004"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7480.php","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7480.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0145","sourceIdentifier":"cve@mitre.org","published":"1993-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail WIZ command enabled, allowing root access."},{"lang":"es","value":"Sendmail WIZ comando  habilitado, permite el acceso de root"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:*:*:*:*:*:*:*:*","matchCriteriaId":"887964FC-405F-40DB-B848-806748BA6FE8"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"cve@mitre.org"},{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1990-11.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1993-14.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"cve@mitre.org"},{"url":"http://www2.dataguard.no/bugtraq/1995_1/0332.html","source":"cve@mitre.org"},{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1990-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1993-14.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www2.dataguard.no/bugtraq/1995_1/0332.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1137","sourceIdentifier":"cve@mitre.org","published":"1993-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"5.2","matchCriteriaId":"672DD6BA-F3B2-4F1A-BA2C-0DA68A47853A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/e-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/6436","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/549","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/e-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/6436","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/549","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0334","sourceIdentifier":"cve@mitre.org","published":"1993-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*","matchCriteriaId":"FEEC0C5A-4A6E-403C-B929-D1EC8B0FE2A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0334","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0334","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0181","sourceIdentifier":"cve@mitre.org","published":"1994-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rpc.walld:rpc.walld:*:*:*:*:*:*:*:*","matchCriteriaId":"68788632-AEEA-40AF-B3EA-B2B1AB3928A2"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0181","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0181","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1242","sourceIdentifier":"cve@mitre.org","published":"1994-02-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"}]}]}],"references":[{"url":"http://packetstormsecurity.org/advisories/hpalert/003","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2162","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/hpalert/003","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2162","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0211","sourceIdentifier":"cve@mitre.org","published":"1994-02-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/24","source":"cve@mitre.org"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=96665790","source":"cve@mitre.org"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124517","source":"cve@mitre.org"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124527","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/24","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=96665790","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124517","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124527","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0338","sourceIdentifier":"cve@mitre.org","published":"1994-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX Licensed Program Product performance tools allow local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0338","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0338","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0120","sourceIdentifier":"cve@mitre.org","published":"1994-03-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/126","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/126","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1135","sourceIdentifier":"cve@mitre.org","published":"1994-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994 and PHSS_5438."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://packetstorm.securify.com/advisories/hpalert/027","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2284","source":"cve@mitre.org"},{"url":"http://packetstorm.securify.com/advisories/hpalert/027","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2284","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1146","sourceIdentifier":"cve@mitre.org","published":"1994-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"9","matchCriteriaId":"22CDE177-1414-45C9-835C-FD15A0B9FC9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"}]}]}],"references":[{"url":"http://www.securityfocus.com/advisories/1555","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2060","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/advisories/1555","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2060","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1388","sourceIdentifier":"cve@mitre.org","published":"1994-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://www.dataguard.no/bugtraq/1994_4/0755.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0197.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0207.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.dataguard.no/bugtraq/1994_4/0755.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0197.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0207.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}},{"cve":{"id":"CVE-1999-1134","sourceIdentifier":"cve@mitre.org","published":"1994-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Vue 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/e-23.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://packetstorm.securify.com/advisories/hpalert/008","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/2284.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/e-23.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://packetstorm.securify.com/advisories/hpalert/008","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/2284.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0113","sourceIdentifier":"cve@mitre.org","published":"1994-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some implementations of rlogin allow root access if given a -froot parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-88"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/458","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/458","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0423","sourceIdentifier":"cve@mitre.org","published":"1994-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in hpterm on HP-UX 10.20 allows local users to gain additional privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-093","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-093","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0337","sourceIdentifier":"cve@mitre.org","published":"1994-06-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"73CE931A-1500-4450-B65A-591CAA3225AB"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:*","matchCriteriaId":"5F40A32B-3EF8-41D4-B6EC-3DC82D550365"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"28B1C99E-D05A-4778-8650-39B63CC8B2F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0337","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0337","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0207","sourceIdentifier":"cve@mitre.org","published":"1994-06-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attacker can execute commands through Majordomo using the Reply-To field and a \"lists\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:1.90:*:*:*:*:*:*:*","matchCriteriaId":"31B44E23-8964-4BE4-9F22-2C7AB0C2F682"},{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:1.91:*:*:*:*:*:*:*","matchCriteriaId":"E6D374F2-8551-4B44-BA96-B7D1F44920D5"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0207","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0207","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1239","sourceIdentifier":"cve@mitre.org","published":"1994-07-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX 9.x does not properly enable the Xauthority mechanism in certain conditions, which could allow local users to access the X display even when they have not explicitly been authorized to do so."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://www.securityfocus.com/advisories/1559","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2261","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/advisories/1559","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2261","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1552","sourceIdentifier":"cve@mitre.org","published":"1994-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2.5","matchCriteriaId":"AEC519E8-F10E-4B51-A7AB-BF4109F91393"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"}]}]}],"references":[{"url":"http://lists.insecure.org/lists/bugtraq/1994/Jul/0038.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/358","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://lists.insecure.org/lists/bugtraq/1994/Jul/0038.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/358","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1494","sourceIdentifier":"cve@mitre.org","published":"1994-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950209-01-P","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/675","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/336","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.tryc.on.ca/archives/bugtraq/1995_1/0614.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2112","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950209-01-P","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/675","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/336","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.tryc.on.ca/archives/bugtraq/1995_1/0614.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2112","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1219","sourceIdentifier":"cve@mitre.org","published":"1994-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/e-33.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1994-13.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/468","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/511","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/e-33.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1994-13.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/468","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/511","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1238","sourceIdentifier":"cve@mitre.org","published":"1994-09-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in CORE-DIAG fileset in HP message catalog in HP-UX 9.05 and earlier allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"9.05","matchCriteriaId":"DBF5B8E5-8CFA-4D46-A67A-13FA4033F1DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://www.securityfocus.com/advisories/1531","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2262","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/advisories/1531","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2262","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1022","sourceIdentifier":"cve@mitre.org","published":"1994-10-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4:*:*:*:*:*:*:*","matchCriteriaId":"C6AACDE0-00BA-4A29-8305-5AA0A4BC273C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/930","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/464","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2111","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/930","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/464","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2111","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1310","sourceIdentifier":"cve@mitre.org","published":"1994-11-04T05:00:00.000","lastModified":"2023-11-07T01:55:08.250","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-1022.  Reason: This candidate is a duplicate of CVE-1999-1022.  Notes: All CVE users should reference CVE-1999-1022 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-1248","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"9.00","matchCriteriaId":"1626B849-4E5A-4431-8651-74B75F61010E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*","matchCriteriaId":"A573388D-BD8F-48D3-8BA9-E4D11402CA22"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*","matchCriteriaId":"6973B4FC-8009-4336-BED4-7B032EA1E570"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*","matchCriteriaId":"D0EB2E93-9774-442C-BB60-E428F53EE6F4"}]}]}],"references":[{"url":"http://packetstormsecurity.org/advisories/hpalert/019","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2058","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/hpalert/019","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2058","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1302","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8797","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7586","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8797","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7586","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1303","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1304","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1305","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0508","sourceIdentifier":"cve@mitre.org","published":"1994-12-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"D323A6B7-2741-4F31-B0D6-5D6FB738A2A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACAAD334-2CA7-4B3B-BA25-302E7610BC2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0633B5A6-7A88-4A96-9462-4C09D124ED36"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0073.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1372","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5050","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0073.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1372","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5050","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0077","sourceIdentifier":"cve@mitre.org","published":"1995-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Predictable TCP sequence numbers allow spoofing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/139","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/139","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0232","sourceIdentifier":"cve@mitre.org","published":"1995-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NCSA WebServer (version 1.5c) gives remote access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa_httpd_project:ncsa_httpd:1.5c:*:*:*:*:*:*:*","matchCriteriaId":"BB92CBD1-8E7C-4DAC-9FA5-D04643F62D98"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0232","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0232","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0235","sourceIdentifier":"cve@mitre.org","published":"1995-02-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_web_server:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7BB3C7C7-F1F0-4161-8223-631764802083"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_web_server:1.4:*:*:*:*:*:*:*","matchCriteriaId":"D3282BD0-E5F4-49BA-81C8-16A8AF9C37A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_web_server:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"64E14B51-26DF-496D-BEAA-82AA3FF90E43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0235","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0235","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0242","sourceIdentifier":"cve@mitre.org","published":"1995-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*","matchCriteriaId":"F432C6C2-8676-4DD5-B9E6-71F6C164EF9D"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0242","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0242","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1098","sourceIdentifier":"cve@mitre.org","published":"1995-03-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:*:*:*:*:*:*:*:*","matchCriteriaId":"B44D379F-F380-42EC-9C9A-A4C8314A4BDF"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1995-03.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/f-12.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/516.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4881","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1995-03.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/f-12.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/516.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4881","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1243","sourceIdentifier":"cve@mitre.org","published":"1995-03-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0.1","matchCriteriaId":"FE16D86A-0C84-4B36-90B0-F5F10B6146D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-16.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2113","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-16.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2113","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0151","sourceIdentifier":"cve@mitre.org","published":"1995-04-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:satan:satan:1.0:*:*:*:*:*:*:*","matchCriteriaId":"8DBA66ED-1AF6-4B47-B3B9-797F59E6A82E"},{"vulnerable":true,"criteria":"cpe:2.3:a:satan:satan:1.1:*:*:*:*:*:*:*","matchCriteriaId":"78F5F86B-37D8-468B-8F21-3B58DF7F77D4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0151","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0151","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1080","sourceIdentifier":"cve@mitre.org","published":"1995-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92633694100270&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93971288323395&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/250","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8350","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92633694100270&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93971288323395&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/250","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8350","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0066","sourceIdentifier":"cve@mitre.org","published":"1995-07-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AnyForm CGI remote execution."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:john_s._roberts:anyform:1.0:*:*:*:*:*:*:*","matchCriteriaId":"86BFFC62-5EFC-496E-82AE-6D59E4D9DB08"},{"vulnerable":true,"criteria":"cpe:2.3:a:john_s._roberts:anyform:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DBED7446-4A8B-4688-8479-1737CD19770E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/719","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/719","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0161","sourceIdentifier":"cve@mitre.org","published":"1995-07-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:10.3\\(3.4\\):*:*:*:*:*:*:*","matchCriteriaId":"630947E3-6D04-4A99-AAB3-B988BD513885"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:10.3\\(4.2\\):*:*:*:*:*:*:*","matchCriteriaId":"850D8A04-E853-4570-A81D-EC053C47BB4B"}]}]}],"references":[{"url":"http://www.osvdb.org/797","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/797","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0172","sourceIdentifier":"cve@mitre.org","published":"1995-08-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FormMail CGI program allows remote execution of commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formmail:*:*:*:*:*:*:*:*","matchCriteriaId":"0D0DEA87-03B6-4290-ACE7-C5A19F68543B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0172","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0172","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0203","sourceIdentifier":"cve@mitre.org","published":"1995-08-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Sendmail, attackers can gain root privileges via SMTP by specifying an improper \"mail from\" address and an invalid \"rcpt to\" address that would cause the mail to bounce to a program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6.10:*:*:*:*:*:*:*","matchCriteriaId":"C39E29CD-70F7-4C96-93DD-18BD4C6DDFA4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1580","sourceIdentifier":"cve@mitre.org","published":"1995-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*","matchCriteriaId":"5DFC5B8B-9102-46A9-9BD3-5CC0B671383F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*","matchCriteriaId":"51BC02ED-17B1-44B3-97DB-F626A2BD2524"},{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*","matchCriteriaId":"EF58EBCB-5735-4569-957D-C37CC38F0823"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*","matchCriteriaId":"44F62CC9-2145-4801-9C3E-4D7232E6BD68"}]}]}],"references":[{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.auscert.org.au/render.html?it=1853&cid=1978","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/3278","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/7829","source":"cve@mitre.org"},{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.auscert.org.au/render.html?it=1853&cid=1978","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/3278","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/7829","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0164","sourceIdentifier":"cve@mitre.org","published":"1995-08-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in the Solaris ps command allows an attacker to overwrite critical files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"}]}]}],"references":[{"url":"http://www.osvdb.org/8346","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8346","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0155","sourceIdentifier":"cve@mitre.org","published":"1995-08-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ghostscript command with the -dSAFER option allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aladdin_enterprises:ghostscript:2.6:*:*:*:*:*:*:*","matchCriteriaId":"1776085C-BF6C-4492-884C-09DEC1F46548"},{"vulnerable":true,"criteria":"cpe:2.3:a:aladdin_enterprises:ghostscript:3.22:*:*:*:*:*:*:*","matchCriteriaId":"2244ABF5-6D70-44A8-B9A2-FBFD5098B8FE"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0155","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0155","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0245","sourceIdentifier":"cve@mitre.org","published":"1995-09-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some configurations of NIS+ in Linux allowed attackers to log in as the user \"+\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0245","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0245","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}