Show plain JSON{"id": "CVE-1999-0023", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "1996-07-24T04:00:00.000", "references": [{"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Local user gains root privileges via buffer overflow in rdist, via lookup() function."}], "lastModified": "2022-08-17T07:15:08.357", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:inet:inet:5.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A680AE78-F1C0-4EA2-9D71-55F3EADA59C8"}, {"criteria": "cpe:2.3:a:inet:inet:6.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1919C12E-1448-4922-BDB1-E123CD23C446"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA7932DF-A035-4506-9BF1-C733DC5DD872"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34797660-41F5-4358-B70F-2A40DE48F182"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27C9E23D-AB82-4AE1-873E-C5493BB96AA1"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "183667CA-6DF1-4BFB-AE32-9ABF55B7283A"}, {"criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F"}, {"criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079"}, {"criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}, {"criteria": "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61FEF2E3-1939-42B3-B32F-A22C173A186A"}, {"criteria": "cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2A765EC-A399-494A-A644-338FB2F014ED"}, {"criteria": "cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AD2701A-E930-4F4D-85F7-02F80135E34E"}, {"criteria": "cpe:2.3:o:sco:openserver:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FAA3048-117B-4E69-8DFE-E96A343FB29A"}, {"criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7"}, {"criteria": "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0169CBF5-9301-42D2-A6DA-73393BD986D8"}, {"criteria": "cpe:2.3:o:sco:tcp_ip:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB18BA3A-B2BB-4816-9223-5BFAAEBCC00E"}, {"criteria": "cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5783678F-80FA-4E1A-A637-7774CE3910EF"}, {"criteria": "cpe:2.3:o:sco:unixware:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43D2F319-DF69-4E52-AF29-06DF1E312030"}, {"criteria": "cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"}, {"criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB"}, {"criteria": "cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615FA6E4-4DE0-422A-9220-F747D95192C9"}, {"criteria": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD1BA107-F2D3-4F13-82EC-4576C429E3C1"}, {"criteria": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1070749A-65E9-439A-A7CC-3CE529A5D5E7"}, {"criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6"}, {"criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}, {"criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416"}, {"criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}