Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2000-1134

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-19 Dec, 2000 | 05:00
Updated At-08 Aug, 2024 | 05:45
Rejected At-
Credits

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:19 Dec, 2000 | 05:00
Updated At:08 Aug, 2024 | 05:45
Rejected At:
â–¼CVE Numbering Authority (CNA)

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2000/20001111a
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/bid/1926
vdb-entry
x_refsource_BID
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
vendor-advisory
x_refsource_CONECTIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
vdb-entry
signature
x_refsource_OVAL
http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
vendor-advisory
x_refsource_COMPAQ
http://www.securityfocus.com/bid/2006
vdb-entry
x_refsource_BID
http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
vendor-advisory
x_refsource_MANDRAKE
http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
vendor-advisory
x_refsource_CALDERA
http://www.redhat.com/support/errata/RHSA-2000-117.html
vendor-advisory
x_refsource_REDHAT
http://www.kb.cert.org/vuls/id/10277
third-party-advisory
x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=97561816504170&w=2
mailing-list
x_refsource_BUGTRAQ
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc
vendor-advisory
x_refsource_FREEBSD
http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
mailing-list
x_refsource_BUGTRAQ
http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
vendor-advisory
x_refsource_MANDRAKE
http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
vendor-advisory
x_refsource_CALDERA
ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
vendor-advisory
x_refsource_SGI
http://www.securityfocus.com/archive/1/146657
mailing-list
x_refsource_BUGTRAQ
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
vendor-advisory
x_refsource_CONECTIVA
http://www.redhat.com/support/errata/RHSA-2000-121.html
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.debian.org/security/2000/20001111a
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://www.securityfocus.com/bid/1926
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
Resource:
vendor-advisory
x_refsource_CONECTIVA
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
Resource:
vendor-advisory
x_refsource_COMPAQ
Hyperlink: http://www.securityfocus.com/bid/2006
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
Resource:
vendor-advisory
x_refsource_MANDRAKE
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
Resource:
vendor-advisory
x_refsource_CALDERA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-117.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.kb.cert.org/vuls/id/10277
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: http://marc.info/?l=bugtraq&m=97561816504170&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
Resource:
vendor-advisory
x_refsource_MANDRAKE
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
Resource:
vendor-advisory
x_refsource_CALDERA
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
Resource:
vendor-advisory
x_refsource_SGI
Hyperlink: http://www.securityfocus.com/archive/1/146657
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
Resource:
vendor-advisory
x_refsource_CONECTIVA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-121.html
Resource:
vendor-advisory
x_refsource_REDHAT
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.debian.org/security/2000/20001111a
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/bid/1926
vdb-entry
x_refsource_BID
x_transferred
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
vendor-advisory
x_refsource_CONECTIVA
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
vendor-advisory
x_refsource_COMPAQ
x_transferred
http://www.securityfocus.com/bid/2006
vdb-entry
x_refsource_BID
x_transferred
http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
vendor-advisory
x_refsource_MANDRAKE
x_transferred
http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
vendor-advisory
x_refsource_CALDERA
x_transferred
http://www.redhat.com/support/errata/RHSA-2000-117.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.kb.cert.org/vuls/id/10277
third-party-advisory
x_refsource_CERT-VN
x_transferred
http://marc.info/?l=bugtraq&m=97561816504170&w=2
mailing-list
x_refsource_BUGTRAQ
x_transferred
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
vendor-advisory
x_refsource_MANDRAKE
x_transferred
http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
vendor-advisory
x_refsource_CALDERA
x_transferred
ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
vendor-advisory
x_refsource_SGI
x_transferred
http://www.securityfocus.com/archive/1/146657
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
vendor-advisory
x_refsource_CONECTIVA
x_transferred
http://www.redhat.com/support/errata/RHSA-2000-121.html
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.debian.org/security/2000/20001111a
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://www.securityfocus.com/bid/1926
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
Resource:
vendor-advisory
x_refsource_CONECTIVA
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
Resource:
vendor-advisory
x_refsource_COMPAQ
x_transferred
Hyperlink: http://www.securityfocus.com/bid/2006
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
Resource:
vendor-advisory
x_refsource_MANDRAKE
x_transferred
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
Resource:
vendor-advisory
x_refsource_CALDERA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-117.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/10277
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=97561816504170&w=2
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
Resource:
vendor-advisory
x_refsource_MANDRAKE
x_transferred
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
Resource:
vendor-advisory
x_refsource_CALDERA
x_transferred
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
Resource:
vendor-advisory
x_refsource_SGI
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/146657
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
Resource:
vendor-advisory
x_refsource_CONECTIVA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-121.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:09 Jan, 2001 | 05:00
Updated At:16 Apr, 2026 | 00:27

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

immunix
immunix
>>immunix>>6.2
cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*
conectiva
conectiva
>>linux>>4.0
cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*
conectiva
conectiva
>>linux>>4.0es
cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*
conectiva
conectiva
>>linux>>4.1
cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*
conectiva
conectiva
>>linux>>4.2
cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*
conectiva
conectiva
>>linux>>5.0
cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*
conectiva
conectiva
>>linux>>5.1
cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*
The MITRE Corporation (Caldera)
caldera
>>openlinux>>*
cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*
The MITRE Corporation (Caldera)
caldera
>>openlinux_edesktop>>2.4
cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*
The MITRE Corporation (Caldera)
caldera
>>openlinux_eserver>>2.3
cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*
HP Inc.
hp
>>hp-ux>>11.11
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
Mandriva (Mandrakesoft)
mandrakesoft
>>mandrake_linux>>6.0
cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*
Mandriva (Mandrakesoft)
mandrakesoft
>>mandrake_linux>>6.1
cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*
Mandriva (Mandrakesoft)
mandrakesoft
>>mandrake_linux>>7.0
cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
Mandriva (Mandrakesoft)
mandrakesoft
>>mandrake_linux>>7.1
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
Mandriva (Mandrakesoft)
mandrakesoft
>>mandrake_linux>>7.2
cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>5.2
cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>6.0
cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>6.1
cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>6.2
cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*
Red Hat, Inc.
redhat
>>linux>>6.2e
cpe:2.3:o:redhat:linux:6.2e:*:*:*:*:*:*:*
SUSE
suse
>>suse_linux>>7.0
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-OtherPrimarynvd@nist.gov
CWE ID: NVD-CWE-Other
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asccve@mitre.org
Patch
Vendor Advisory
ftp://patches.sgi.com/support/free/security/advisories/20011103-02-Pcve@mitre.org
N/A
http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.htmlcve@mitre.org
N/A
http://archives.neohapsis.com/archives/tru64/2002-q1/0009.htmlcve@mitre.org
N/A
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350cve@mitre.org
N/A
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354cve@mitre.org
N/A
http://marc.info/?l=bugtraq&m=97561816504170&w=2cve@mitre.org
N/A
http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txtcve@mitre.org
N/A
http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txtcve@mitre.org
N/A
http://www.debian.org/security/2000/20001111acve@mitre.org
N/A
http://www.kb.cert.org/vuls/id/10277cve@mitre.org
US Government Resource
http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3cve@mitre.org
N/A
http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3cve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2000-117.htmlcve@mitre.org
N/A
http://www.redhat.com/support/errata/RHSA-2000-121.htmlcve@mitre.org
N/A
http://www.securityfocus.com/archive/1/146657cve@mitre.org
N/A
http://www.securityfocus.com/bid/1926cve@mitre.org
N/A
http://www.securityfocus.com/bid/2006cve@mitre.org
Exploit
Patch
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047cve@mitre.org
N/A
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.ascaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
ftp://patches.sgi.com/support/free/security/advisories/20011103-02-Paf854a3a-2127-422b-91ae-364da2661108
N/A
http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://archives.neohapsis.com/archives/tru64/2002-q1/0009.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350af854a3a-2127-422b-91ae-364da2661108
N/A
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=97561816504170&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txtaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2000/20001111aaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.kb.cert.org/vuls/id/10277af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2000-117.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2000-121.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/archive/1/146657af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/1926af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/2006af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc
Source: cve@mitre.org
Resource:
Patch
Vendor Advisory
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=97561816504170&w=2
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.debian.org/security/2000/20001111a
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/10277
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-117.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-121.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/146657
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/1926
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/2006
Source: cve@mitre.org
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
Source: cve@mitre.org
Resource: N/A
Hyperlink: ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=97561816504170&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.debian.org/security/2000/20001111a
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.kb.cert.org/vuls/id/10277
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-117.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.redhat.com/support/errata/RHSA-2000-121.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/archive/1/146657
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/1926
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/2006
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Vendor Advisory
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

429Records found

CVE-2020-7207
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-8
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 22.95%
||
7 Day CHG~0.00%
Published-05 Nov, 2020 | 20:14
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local elevation of privilege using physical access security vulnerability was found in HPE Proliant Gen10 Servers using Intel Innovation Engine (IE). This attack requires a physical attack to the server motherboard. To mitigate this issue, ensure your server is always physically secured. HPE will not address this issue in the impacted Gen 10 servers listed. HPE recommends using appropriate physical security methods as a compensating control to disallow an attacker from having physical access to the server main circuit board.

Action-Not Available
Vendor-n/aHP Inc.
Product-proliant_bl460c_gen10_firmwareproliant_dl560_gen10_firmwareproliant_dl120_gen10proliant_dl380_gen10_firmwareapollo_2000proliant_xl170r_gen10_firmwareproliant_ml110_gen10_firmwaresynergy_660_gen10proliant_xl190r_gen10proliant_e910proliant_dl180_gen10_firmwareproliant_dl360_gen10_firmwareproliant_dl360_gen10apollo_4200_gen10synergy_660_gen10_firmwaresynergy_480_gen10proliant_dl580_gen10_firmwareproliant_dl380_gen10proliant_xl230k_gen10apollo_4500proliant_xl270d_gen10_firmwareproliant_dl560_gen10proliant_dl160_gen10proliant_xl230k_gen10_firmwareproliant_xl450_gen10_firmwareproliant_ml350_gen10_firmwareproliant_dl580_gen10proliant_dl120_gen10_firmwareproliant_xl450_gen10proliant_ml110_gen10proliant_xl170r_gen10apollo_2000_firmwareproliant_ml350_gen10proliant_dl180_gen10proliant_e910_firmwareapollo_4200_gen10_firmwareproliant_bl460c_gen10proliant_xl270d_gen10apollo_4500_firmwaresynergy_480_gen10_firmwareproliant_dl160_gen10_firmwareproliant_xl190r_gen10_firmwareHPE ProLiant BL460c Gen10 Server Blade; HPE ProLiant DL360 Gen10 Server; HPE ProLiant DL380 Gen10 Server; HPE ProLiant DL560 Gen10 Server; HPE ProLiant DL580 Gen10 Server; HPE ProLiant ML110 Gen10 Server; HPE ProLiant XL230k Gen10 Server; HPE Synergy 480 Gen10 Compute Module; HPE Synergy 660 Gen10 Compute Module; HPE ProLiant DL180 Gen10 Server; HPE ProLiant DL160 Gen10 Server; HPE ProLiant DL120 Gen10 Server; HPE ProLiant XL190r Gen10 Server; HPE ProLiant ML350 Gen10 Server; HPE ProLiant XL170r Gen10 Server; HPE Apollo 2000 System; HPE Apollo 4500 System; HPE ProLiant XL270d Gen10 Server; HPE Apollo 4200 Gen10 Server; HPE ProLiant e910 Server Blade; HPE ProLiant XL450 Gen10 Server; HPE ProLiant XL230k Gen10 Server - bad oid
CVE-2009-3080
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.07% / 21.50%
||
7 Day CHG~0.00%
Published-20 Nov, 2009 | 17:00
Updated-07 Aug, 2024 | 06:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncSUSEDebian GNU/LinuxVMware (Broadcom Inc.)Red Hat, Inc.openSUSECanonical Ltd.
Product-enterprise_linux_serverubuntu_linuxesxlinux_enterprise_serverdebian_linuxlinux_kernelvirtualizationopensusefedoraenterprise_linux_server_workstationenterprise_linux_euslinux_enterprise_desktopenterprise_linux_desktopn/a
CWE ID-CWE-129
Improper Validation of Array Index
CVE-2005-1763
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.04% / 12.73%
||
7 Day CHG~0.00%
Published-14 Jun, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.

Action-Not Available
Vendor-n/aNovellSUSE
Product-linux_desktopsuse_linuxn/a
CVE-2019-13272
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-80.56% / 99.14%
||
7 Day CHG~0.00%
Published-17 Jul, 2019 | 12:32
Updated-06 Nov, 2025 | 16:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-06-10||Apply updates per vendor instructions.

In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxNetApp, Inc.Fedora ProjectRed Hat, Inc.Linux Kernel Organization, Inc
Product-h410centerprise_linuxenterprise_linux_for_real_time_for_nfventerprise_linux_for_ibm_z_systemsdebian_linuxe-series_performance_analyzerh410c_firmwarehci_compute_nodesteelstore_cloud_integrated_storagefedoraenterprise_linux_for_real_time_for_nfv_tusactive_iq_unified_managersolidfireenterprise_linux_for_arm_64aff_a700subuntu_linuxh610sservice_processorhci_management_nodeenterprise_linux_for_real_timeaff_a700s_firmwareh610s_firmwaree-series_santricity_os_controllerlinux_kernelenterprise_linux_for_real_time_tusn/aKernel
CVE-2005-0091
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 14.28%
||
7 Day CHG~0.00%
Published-21 Feb, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unknown vulnerability in the Red Hat Enterprise Linux 4 kernel 4GB/4GB split patch, when using the hugemem kernel, allows local users to read and write to arbitrary kernel memory and gain privileges via certain syscalls.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linuxn/a
CVE-2005-0020
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 24.03%
||
7 Day CHG~0.00%
Published-22 Jan, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in playmidi before 2.4 allows local users to execute arbitrary code.

Action-Not Available
Vendor-playmidin/aMandriva (Mandrakesoft)
Product-mandrake_linuxplaymidimandrake_linux_corporate_servern/a
CVE-2001-0172
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.69% / 71.86%
||
7 Day CHG~0.00%
Published-09 Mar, 2001 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ReiserFS 3.5.28 in SuSE Linux allows local users to cause a denial of service and possibly execute arbitrary commands by via a long directory name.

Action-Not Available
Vendor-hans_reisern/aSUSE
Product-reiserfssuse_linuxn/a
CVE-2005-0403
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.27%
||
7 Day CHG~0.00%
Published-01 Sep, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty's in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-enterprise_linux_desktopenterprise_linuxn/a
CVE-2004-2693
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.03% / 9.82%
||
7 Day CHG~0.00%
Published-06 Oct, 2007 | 20:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP-UX B.11.00 and B.11.11 with B6848AB GTK+ Support Libraries installed uses insecure directory permissions, which allows local users to gain privileges via files in /opt/gnome/src/GLib/.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2004-2396
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.43%
||
7 Day CHG~0.00%
Published-17 Aug, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

passwd 0.68 does not check the return code for the pam_start function, which has unknown impact and attack vectors that may prevent "safe and proper operation" of PAM.

Action-Not Available
Vendor-n/aMandriva (Mandrakesoft)
Product-mandrake_linuxmandrake_multi_network_firewallmandrake_linux_corporate_servern/a
CVE-2015-8816
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.08% / 24.58%
||
7 Day CHG~0.00%
Published-27 Apr, 2016 | 17:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.

Action-Not Available
Vendor-n/aNovellLinux Kernel Organization, IncSUSE
Product-suse_linux_enterprise_real_time_extensionsuse_linux_enterprise_workstation_extensionsuse_linux_enterprise_debuginfolinux_kernelsuse_linux_enterprise_live_patchingsuse_linux_enterprise_serverlinux_enterprise_live_patchingsuse_linux_enterprise_desktopsuse_linux_enterprise_module_for_public_cloudsuse_linux_enterprise_software_development_kitlinux_enterprise_servern/a
CVE-2004-1764
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.08% / 22.64%
||
7 Day CHG~0.00%
Published-10 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CDE libDtSvc on HP-UX B.11.00, B.11.04, B.11.11, and B.11.22 allows local users to gain root privileges via unknown vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2004-0834
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.61%
||
7 Day CHG~0.00%
Published-20 Oct, 2004 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in Speedtouch USB driver before 1.3.1 allows local users to execute arbitrary code via (1) modem_run, (2) pppoa2, or (3) pppoa3.

Action-Not Available
Vendor-speedtouchn/aMandriva (Mandrakesoft)Gentoo Foundation, Inc.
Product-linuxmandrake_linuxspeedtouch_usb_drivermandrake_multi_network_firewallmandrake_linux_corporate_servern/a
CVE-2004-0884
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 18.52%
||
7 Day CHG~0.00%
Published-21 Oct, 2004 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.

Action-Not Available
Vendor-conectivacyrusn/a
Product-sasllinuxn/a
CVE-2004-1051
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.27% / 50.89%
||
7 Day CHG~0.00%
Published-18 Nov, 2004 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

Action-Not Available
Vendor-trustixtodd_millern/aUbuntuDebian GNU/LinuxMandriva (Mandrakesoft)
Product-debian_linuxubuntu_linuxmandrake_linuxsudomandrake_multi_network_firewallsecure_linuxmandrake_linux_corporate_servern/a
CVE-2016-2246
Matching Score-8
Assigner-HP Inc.
ShareView Details
Matching Score-8
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.01%
||
7 Day CHG~0.00%
Published-29 Dec, 2016 | 09:02
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HP ThinPro 4.4 through 6.1 mishandles the keyboard layout control panel and virtual keyboard application, which allows local users to bypass intended access restrictions and gain privileges via unspecified vectors.

Action-Not Available
Vendor-n/aHP Inc.
Product-thinpron/a
CVE-2015-8539
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.65%
||
7 Day CHG~0.00%
Published-08 Feb, 2016 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncCanonical Ltd.SUSE
Product-linux_kernelubuntu_linuxlinux_enterprise_real_time_extensionn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2004-1070
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 20.00%
||
7 Day CHG~0.00%
Published-01 Dec, 2004 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.

Action-Not Available
Vendor-turbolinuxtrustixn/aRed Hat, Inc.Linux Kernel Organization, IncSUSE
Product-linux_advanced_workstationsuse_linuxfedora_coreenterprise_linux_desktopsecure_linuxturbolinux_serverlinux_kernelenterprise_linuxn/a
CVE-2003-0061
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 21.76%
||
7 Day CHG~0.00%
Published-15 Apr, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in passwd for HP UX B.10.20 allows local users to execute arbitrary commands with root privileges via a long LANG environment variable.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2003-1098
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.42% / 62.21%
||
7 Day CHG~0.00%
Published-11 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Xserver for HP-UX 11.22 was not properly built, which introduced a vulnerability that allows local users to gain privileges.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2003-0188
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.04% / 12.55%
||
7 Day CHG~0.00%
Published-17 May, 2003 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.

Action-Not Available
Vendor-lvn/aRed Hat, Inc.
Product-linuxlvn/a
CVE-2003-0840
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.44% / 63.36%
||
7 Day CHG~0.00%
Published-09 Oct, 2003 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in dtprintinfo on HP-UX 11.00, and possibly other operating systems, allows local users to gain root privileges via a long DISPLAY environment variable.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2003-0019
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.66% / 71.26%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

uml_net in the kernel-utils package for Red Hat Linux 8.0 has incorrect setuid root privileges, which allows local users to modify network interfaces, e.g. by modifying ARP entries or placing interfaces into promiscuous mode.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2002-1615
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 29.81%
||
7 Day CHG~0.00%
Published-25 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to execute arbitrary code via (1) msgchk or (2) .upd..loader.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxtru64n/a
CVE-2002-2363
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.24% / 47.46%
||
7 Day CHG~0.00%
Published-29 Oct, 2007 | 19:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VJE.VJE-RUN in HP-UX 11.00 adds bin to /etc/PATH, which could allow local users to gain privileges.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2002-1616
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.34% / 57.14%
||
7 Day CHG~0.00%
Published-25 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.

Action-Not Available
Vendor-n/aHP Inc.
Product-tru64n/a
CVE-2002-1612
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.68% / 71.61%
||
7 Day CHG~0.00%
Published-25 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in mailcv in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxtru64n/a
CVE-2002-1614
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.99% / 76.95%
||
7 Day CHG~0.00%
Published-25 Mar, 2005 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in HP Tru64 UNIX allows local users to execute arbitrary code via a long argument to /usr/bin/at.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxtru64n/a
CVE-2002-1285
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.78%
||
7 Day CHG~0.00%
Published-14 Nov, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

runlpr in the LPRng package allows the local lp user to gain root privileges via certain command line arguments.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CVE-2002-0506
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.23% / 45.63%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and earlier may allow attackers to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2002-0981
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.34% / 56.94%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ndcfg command for UnixWare 7.1.1 and Open UNIX 8.0.0 allows local users to execute arbitrary code via a long command line.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwareopenunixn/a
CVE-2002-1155
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 28.86%
||
7 Day CHG~0.00%
Published-05 Jun, 2003 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in KON kon2 0.3.9b and earlier allows local users to execute arbitrary code via a long -Coding command line argument.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2002-0854
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 19.63%
||
7 Day CHG~0.00%
Published-14 Aug, 2002 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflows in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the i4l package on SuSE 7.3, 8.0, and possibly other operating systems, may allow local users to gain privileges.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CVE-2002-0678
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.43% / 62.57%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.

Action-Not Available
Vendor-compaqxi_graphicsn/aHP Inc.IBM CorporationSilicon Graphics, Inc.Sun Microsystems (Oracle Corporation)The MITRE Corporation (Caldera)
Product-sunosdextopirixsolaristru64hp-uxunixwareaixopenunixn/a
CVE-2002-0442
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.14% / 34.86%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in dlvr_audit for Caldera OpenServer 5.0.5 and 5.0.6 allows local users to gain root privileges.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-openservern/a
CVE-2002-0827
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.78%
||
7 Day CHG~0.00%
Published-07 Aug, 2002 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in pppd on UnixWare 7.1.1 and Open UNIX 8.0.0 allows local users to gain root privileges via (1) ppptalk or (2) ppp, a different vulnerability than CVE-2002-0824.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwareopenunixn/a
CVE-2002-0762
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.78%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

shadow package in SuSE 8.0 allows local users to destroy the /etc/passwd and /etc/shadow files or assign extra group privileges to some users by changing filesize limits before calling programs that modify the files.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CVE-2002-0911
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.78%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Caldera Volution Manager 1.1 stores the Directory Administrator password in cleartext in the slapd.conf file, which could allow local users to gain privileges.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-volution_managern/a
CVE-2002-1160
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.07% / 20.49%
||
7 Day CHG~0.00%
Published-01 Sep, 2004 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration of the pam_xauth module forwards MIT-Magic-Cookies to new X sessions, which could allow local users to gain root privileges by stealing the cookies from a temporary .xauth file, which is created with the original user's credentials after root uses su.

Action-Not Available
Vendor-n/aRed Hat, Inc.
Product-linuxn/a
CVE-2001-1164
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.20%
||
7 Day CHG~0.00%
Published-15 Mar, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in uucp utilities in UnixWare 7 allows local users to execute arbitrary code via long command line arguments to (1) uucp, (2) uux, (3) bnuconvert, (4) uucico, (5) uuxcmd, or (6) uuxqt.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwaren/a
CVE-2002-0246
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.24% / 46.91%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Format string vulnerability in the message catalog library functions in UnixWare 7.1.1 allows local users to gain privileges by modifying the LC_MESSAGE environment variable to read other message catalogs containing format strings from setuid programs such as vxprint.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwaren/a
CVE-2002-0062
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.19% / 41.34%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."

Action-Not Available
Vendor-n/aDebian GNU/LinuxFreeBSD FoundationGNURed Hat, Inc.SUSE
Product-debian_linuxlinuxncursessuse_linuxfreebsdn/a
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2002-0105
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.15% / 35.78%
||
7 Day CHG~0.00%
Published-15 Mar, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CDE dtlogin in Caldera UnixWare 7.1.0, and possibly other operating systems, allows local users to gain privileges via a symlink attack on /var/dt/Xerrors since /var/dt is world-writable.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwaren/a
CVE-2002-0004
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.27% / 50.92%
||
7 Day CHG~0.00%
Published-25 Jun, 2002 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.

Action-Not Available
Vendor-n/aDebian GNU/LinuxMandriva (Mandrakesoft)SlackwareNetBSDFreeBSD FoundationRed Hat, Inc.The MITRE Corporation (Caldera)SUSE
Product-debian_linuxopenlinux_serverlinuxmandrake_linuxsuse_linuxopenlinux_workstationfreebsdslackware_linuxnetbsdn/a
CVE-2001-1374
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.65%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.

Action-Not Available
Vendor-conectivadon_libesn/aRed Hat, Inc.
Product-linuxexpectn/a
CVE-2001-1478
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 18.68%
||
7 Day CHG~0.00%
Published-21 Jun, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in xlock in UnixWare 7.1.0 and 7.1.1 and Open Unix 8.0.0 allows local users to execute arbitrary code.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwareopenunixn/a
CVE-2001-1198
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.17% / 38.75%
||
7 Day CHG~0.00%
Published-15 Mar, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RLPDaemon in HP-UX 10.20 and 11.0 allows local users to overwrite arbitrary files and gain privileges by specifying the target file in the -L option.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
CVE-2001-1063
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.46%
||
7 Day CHG~0.00%
Published-09 Mar, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in uidadmin in Caldera Open Unix 8.0.0 and UnixWare 7 allows local users to gain root privileges via a long -S (scheme) command line argument.

Action-Not Available
Vendor-n/aThe MITRE Corporation (Caldera)
Product-unixwareopenunixn/a
CVE-2001-0525
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.23%
||
7 Day CHG~0.00%
Published-09 Mar, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in dsh in dqs 3.2.7 in SuSE Linux 7.0 and earlier, and possibly other operating systems, allows local users to gain privileges via a long first command line argument.

Action-Not Available
Vendor-n/aSUSE
Product-suse_linuxn/a
CVE-2001-0551
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.11% / 29.77%
||
7 Day CHG~0.00%
Published-18 Feb, 2002 | 05:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in CDE Print Viewer (dtprintinfo) allows local users to execute arbitrary code by copying text from the clipboard into the Help window.

Action-Not Available
Vendor-n/aHP Inc.
Product-hp-uxn/a
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 8
  • 9
  • Next
Details not found