cve-2002-1616
Vulnerability from cvelistv5
Published
2005-03-25 05:00
Modified
2024-08-08 03:34
Severity ?
Summary
Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
cve@mitre.orghttp://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.orghttp://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.orghttp://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.orghttp://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.orghttp://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txtExploit
cve@mitre.orghttp://www.kb.cert.org/vuls/id/137555Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.kb.cert.org/vuls/id/177067Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.kb.cert.org/vuls/id/193347Patch, US Government Resource
cve@mitre.orghttp://www.kb.cert.org/vuls/id/671627Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.kb.cert.org/vuls/id/864083US Government Resource
cve@mitre.orghttp://www.securityfocus.com/archive/1/290115Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/5379Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/5380Patch
cve@mitre.orghttp://www.securityfocus.com/bid/5381Patch
cve@mitre.orghttp://www.securityfocus.com/bid/5382Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/10614
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/11620
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/137555Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/177067Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/193347Patch, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/671627Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/864083US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/290115Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/5379Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/5380Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/5381Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/5382Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.053Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#177067",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/177067"
          },
          {
            "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt"
          },
          {
            "name": "tru64-chfn-bo(10614)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10614"
          },
          {
            "name": "VU#193347",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/193347"
          },
          {
            "name": "5382",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5382"
          },
          {
            "name": "5381",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5381"
          },
          {
            "name": "VU#671627",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/671627"
          },
          {
            "name": "tru64-dxchpwd-bo(11620)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11620"
          },
          {
            "name": "5379",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5379"
          },
          {
            "name": "SSRT2257",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "VU#137555",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/137555"
          },
          {
            "name": "5380",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5380"
          },
          {
            "name": "SSRT2259",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
          },
          {
            "name": "20020902 Happy Labor Day from Snosoft",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/290115"
          },
          {
            "name": "SSRT2192",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "SSRT2190",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "VU#864083",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/864083"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#177067",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/177067"
        },
        {
          "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt"
        },
        {
          "name": "tru64-chfn-bo(10614)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10614"
        },
        {
          "name": "VU#193347",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/193347"
        },
        {
          "name": "5382",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5382"
        },
        {
          "name": "5381",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5381"
        },
        {
          "name": "VU#671627",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/671627"
        },
        {
          "name": "tru64-dxchpwd-bo(11620)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11620"
        },
        {
          "name": "5379",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5379"
        },
        {
          "name": "SSRT2257",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "VU#137555",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/137555"
        },
        {
          "name": "5380",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5380"
        },
        {
          "name": "SSRT2259",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
        },
        {
          "name": "20020902 Happy Labor Day from Snosoft",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/290115"
        },
        {
          "name": "SSRT2192",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "SSRT2190",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "VU#864083",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/864083"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1616",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#177067",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/177067"
            },
            {
              "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
            },
            {
              "name": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt",
              "refsource": "MISC",
              "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt"
            },
            {
              "name": "tru64-chfn-bo(10614)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10614"
            },
            {
              "name": "VU#193347",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/193347"
            },
            {
              "name": "5382",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5382"
            },
            {
              "name": "5381",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5381"
            },
            {
              "name": "VU#671627",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/671627"
            },
            {
              "name": "tru64-dxchpwd-bo(11620)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11620"
            },
            {
              "name": "5379",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5379"
            },
            {
              "name": "SSRT2257",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "VU#137555",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/137555"
            },
            {
              "name": "5380",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5380"
            },
            {
              "name": "SSRT2259",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
            },
            {
              "name": "20020902 Happy Labor Day from Snosoft",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/290115"
            },
            {
              "name": "SSRT2192",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "SSRT2190",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "VU#864083",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/864083"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1616",
    "datePublished": "2005-03-25T05:00:00",
    "dateReserved": "2005-03-25T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.053Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2002-1616\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-08-01T04:00:00.000\",\"lastModified\":\"2024-11-20T23:41:43.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:4.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8BA552-394A-4E06-8CAD-24A2F542FD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:4.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43FAAEF-B0DD-466F-A74E-43CBA4CCF7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:5.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F90BA0-45D4-4089-BFBC-69FD1DB10C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5840611-A108-48EE-9D5A-4B6DA0621FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1839F0EE-84D7-4055-A044-5AB5E350225E\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/137555\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/177067\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/193347\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/671627\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864083\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/290115\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5379\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5380\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5381\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5382\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10614\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/11620\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/137555\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/177067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/193347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/671627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/290115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5381\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/11620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.