CVE-2002-1616 (GCVE-0-2002-1616)
Vulnerability from cvelistv5
Published
2005-03-25 05:00
Modified
2024-08-08 03:34
Severity ?
CWE
  • n/a
Summary
Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.
References
cve@mitre.org http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
cve@mitre.org http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
cve@mitre.org http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.org http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.org http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.org http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
cve@mitre.org http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt Exploit
cve@mitre.org http://www.kb.cert.org/vuls/id/137555 Third Party Advisory, US Government Resource
cve@mitre.org http://www.kb.cert.org/vuls/id/177067 Third Party Advisory, US Government Resource
cve@mitre.org http://www.kb.cert.org/vuls/id/193347 Patch, US Government Resource
cve@mitre.org http://www.kb.cert.org/vuls/id/671627 Third Party Advisory, US Government Resource
cve@mitre.org http://www.kb.cert.org/vuls/id/864083 US Government Resource
cve@mitre.org http://www.securityfocus.com/archive/1/290115 Vendor Advisory
cve@mitre.org http://www.securityfocus.com/bid/5379 Vendor Advisory
cve@mitre.org http://www.securityfocus.com/bid/5380 Patch
cve@mitre.org http://www.securityfocus.com/bid/5381 Patch
cve@mitre.org http://www.securityfocus.com/bid/5382 Patch
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
cve@mitre.org https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108 http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
af854a3a-2127-422b-91ae-364da2661108 http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt Exploit
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/137555 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/177067 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/193347 Patch, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/671627 Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.kb.cert.org/vuls/id/864083 US Government Resource
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/archive/1/290115 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/5379 Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/5380 Patch
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/5381 Patch
af854a3a-2127-422b-91ae-364da2661108 http://www.securityfocus.com/bid/5382 Patch
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
af854a3a-2127-422b-91ae-364da2661108 https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:34:55.053Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#177067",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/177067"
          },
          {
            "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt"
          },
          {
            "name": "tru64-chfn-bo(10614)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10614"
          },
          {
            "name": "VU#193347",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/193347"
          },
          {
            "name": "5382",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5382"
          },
          {
            "name": "5381",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5381"
          },
          {
            "name": "VU#671627",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/671627"
          },
          {
            "name": "tru64-dxchpwd-bo(11620)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11620"
          },
          {
            "name": "5379",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5379"
          },
          {
            "name": "SSRT2257",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "VU#137555",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/137555"
          },
          {
            "name": "5380",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5380"
          },
          {
            "name": "SSRT2259",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
          },
          {
            "name": "20020902 Happy Labor Day from Snosoft",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/290115"
          },
          {
            "name": "SSRT2192",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "SSRT2190",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
          },
          {
            "name": "VU#864083",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/864083"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#177067",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/177067"
        },
        {
          "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt"
        },
        {
          "name": "tru64-chfn-bo(10614)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10614"
        },
        {
          "name": "VU#193347",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/193347"
        },
        {
          "name": "5382",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5382"
        },
        {
          "name": "5381",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5381"
        },
        {
          "name": "VU#671627",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/671627"
        },
        {
          "name": "tru64-dxchpwd-bo(11620)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11620"
        },
        {
          "name": "5379",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5379"
        },
        {
          "name": "SSRT2257",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "VU#137555",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/137555"
        },
        {
          "name": "5380",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5380"
        },
        {
          "name": "SSRT2259",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
        },
        {
          "name": "20020902 Happy Labor Day from Snosoft",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/290115"
        },
        {
          "name": "SSRT2192",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "SSRT2190",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
        },
        {
          "name": "VU#864083",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/864083"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1616",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#177067",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/177067"
            },
            {
              "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
            },
            {
              "name": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt",
              "refsource": "MISC",
              "url": "http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt"
            },
            {
              "name": "tru64-chfn-bo(10614)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10614"
            },
            {
              "name": "VU#193347",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/193347"
            },
            {
              "name": "5382",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5382"
            },
            {
              "name": "5381",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5381"
            },
            {
              "name": "VU#671627",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/671627"
            },
            {
              "name": "tru64-dxchpwd-bo(11620)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11620"
            },
            {
              "name": "5379",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5379"
            },
            {
              "name": "SSRT2257",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "VU#137555",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/137555"
            },
            {
              "name": "5380",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5380"
            },
            {
              "name": "SSRT2259",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "20020919 iDEFENSE OSF1/Tru64 3.x vuln clarification",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html"
            },
            {
              "name": "20020902 Happy Labor Day from Snosoft",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/290115"
            },
            {
              "name": "SSRT2192",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "SSRT2190",
              "refsource": "HP",
              "url": "http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html"
            },
            {
              "name": "VU#864083",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/864083"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1616",
    "datePublished": "2005-03-25T05:00:00",
    "dateReserved": "2005-03-25T00:00:00",
    "dateUpdated": "2024-08-08T03:34:55.053Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2002-1616\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-08-01T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:4.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8BA552-394A-4E06-8CAD-24A2F542FD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:4.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E43FAAEF-B0DD-466F-A74E-43CBA4CCF7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:5.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3F90BA0-45D4-4089-BFBC-69FD1DB10C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5840611-A108-48EE-9D5A-4B6DA0621FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1839F0EE-84D7-4055-A044-5AB5E350225E\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/137555\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/177067\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/193347\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/671627\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864083\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/290115\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5379\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5380\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5381\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5382\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10614\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/11620\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/137555\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/177067\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/193347\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/671627\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/864083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/archive/1/290115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/5380\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5381\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securityfocus.com/bid/5382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/11620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…