Filtered by vendor Sco
Subscriptions
Total
129 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2003-0937 | 1 Sco | 2 Open Unix, Unixware | 2025-04-03 | N/A |
SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user. | ||||
CVE-1999-1209 | 1 Sco | 2 Open Desktop, Openserver | 2025-04-03 | N/A |
Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges. | ||||
CVE-1999-1252 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
Vulnerability in a certain system call in SCO UnixWare 2.0.x and 2.1.0 allows local users to access arbitrary files and gain root privileges. | ||||
CVE-1999-1302 | 1 Sco | 5 Open Desktop, Open Desktop Lite, Openserver Enterprise System and 2 more | 2025-04-03 | N/A |
Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access. | ||||
CVE-1999-1303 | 1 Sco | 5 Open Desktop, Open Desktop Lite, Openserver Enterprise System and 2 more | 2025-04-03 | N/A |
Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access. | ||||
CVE-1999-1304 | 1 Sco | 5 Open Desktop, Open Desktop Lite, Openserver Enterprise System and 2 more | 2025-04-03 | N/A |
Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access. | ||||
CVE-1999-1305 | 1 Sco | 5 Open Desktop, Open Desktop Lite, Openserver Enterprise System and 2 more | 2025-04-03 | N/A |
Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access. | ||||
CVE-1999-1450 | 1 Sco | 2 Openserver, Unixware | 2025-04-03 | N/A |
Vulnerability in (1) rlogin daemon rshd and (2) scheme on SCO UNIX OpenServer 5.0.5 and earlier, and SCO UnixWare 7.0.1 and earlier, allows remote attackers to gain privileges. | ||||
CVE-1999-1571 | 1 Sco | 1 Openserver | 2025-04-03 | N/A |
Buffer overflow in sar for SCO OpenServer 5.0.0 through 5.0.5 may allow local users to gain root privileges via a long -f parameter, a different vulnerability than CVE-1999-1570. | ||||
CVE-2000-0003 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
Buffer overflow in UnixWare rtpm program allows local users to gain privileges via a long environmental variable. | ||||
CVE-1999-0866 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
Buffer overflow in UnixWare xauto program allows local users to gain root privilege. | ||||
CVE-1999-0345 | 4 Freebsd, Ibm, Sco and 1 more | 7 Freebsd, Aix, Sng and 4 more | 2025-04-03 | N/A |
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems. | ||||
CVE-2000-0130 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
Buffer overflow in SCO scohelp program allows remote attackers to execute commands. | ||||
CVE-2000-0099 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
Buffer overflow in UnixWare ppptalk command allows local users to gain privileges via a long prompt argument. | ||||
CVE-2000-0154 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack. | ||||
CVE-2000-0158 | 1 Sco | 1 Openserver | 2025-04-03 | N/A |
Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon. | ||||
CVE-2000-0173 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of service. | ||||
CVE-2000-0224 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
ARCserve agent in SCO UnixWare 7.x allows local attackers to gain root privileges via a symlink attack. | ||||
CVE-2000-0306 | 1 Sco | 1 Openserver | 2025-04-03 | N/A |
Buffer overflow in calserver in SCO OpenServer allows remote attackers to gain root access via a long message. | ||||
CVE-1999-0864 | 1 Sco | 1 Unixware | 2025-04-03 | N/A |
UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file. |