CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

SCO » Unixware » 7.1 * * * : Security Vulnerabilities

Cpe Name:cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*
Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-0224 +Priv 2000-02-15 2008-09-10
1.2
None Local High Not required None Partial None
ARCserve agent in SCO UnixWare 7.x allows local attackers to gain root privileges via a symlink attack.
2 CVE-2000-0215 +Priv 2000-02-08 2008-09-10
7.2
None Local Low Not required Complete Complete Complete
Vulnerability in SCO cu program in UnixWare 7.x allows local users to gain privileges.
3 CVE-2000-0173 DoS 2000-03-10 2008-09-10
5.0
None Remote Low Not required None None Partial
Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of service.
4 CVE-2000-0154 2000-02-16 2008-09-10
1.2
None Local High Not required None Partial None
The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack.
5 CVE-2000-0130 Exec Code Overflow 2000-01-27 2016-10-18
7.2
None Local Low Not required Complete Complete Complete
Buffer overflow in SCO scohelp program allows remote attackers to execute commands.
6 CVE-2000-0029 +Priv 1999-12-27 2016-10-18
4.6
None Local Low Not required Partial Partial Partial
UnixWare pis and mkpis commands allow local users to gain privileges via a symlink attack.
7 CVE-2000-0026 Overflow 1999-12-21 2016-10-18
10.0
None Remote Low Not required Complete Complete Complete
Buffer overflow in UnixWare i2odialogd daemon allows remote attackers to gain root access via a long username/password authorization string.
8 CVE-1999-0988 1999-12-04 2022-08-17
7.2
None Local Low Not required Complete Complete Complete
UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.
9 CVE-1999-0979 +Priv 2000-04-11 2016-10-18
7.2
None Local Low Not required Complete Complete Complete
The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.
10 CVE-1999-0942 +Priv 1999-10-04 2022-08-17
7.2
None Local Low Not required Complete Complete Complete
UnixWare dos7utils allows a local user to gain root privileges by using the STATICMERGE environmental variable to find a script which it executes.
11 CVE-1999-0866 Overflow +Priv 1999-12-03 2016-10-18
7.2
None Local Low Not required Complete Complete Complete
Buffer overflow in UnixWare xauto program allows local users to gain root privilege.
12 CVE-1999-0864 1999-12-03 2016-10-18
7.2
None Local Low Not required Complete Complete Complete
UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file.
13 CVE-1999-0836 1998-12-02 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack.
14 CVE-1999-0828 1999-12-02 2008-09-09
3.6
None Local Low Not required Partial Partial None
UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission.
15 CVE-1999-0825 1999-12-03 2008-09-09
3.6
None Local Low Not required Partial Partial None
The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.
Total number of vulnerabilities : 15   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.