Show plain JSON{"id": "CVE-1999-0138", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": true, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "1996-06-26T04:00:00.000", "references": [{"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0138", "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access."}], "lastModified": "2022-08-17T07:15:11.853", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:apple:a_ux:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A2CCF8-36A1-4E5E-A36F-5E90357A2B42"}, {"criteria": "cpe:2.3:o:digital:osf_1:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B804A762-00CC-4F03-9E6D-31BB36E4159A"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34797660-41F5-4358-B70F-2A40DE48F182"}, {"criteria": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27C9E23D-AB82-4AE1-873E-C5493BB96AA1"}, {"criteria": "cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19587780-3515-484C-BCB4-F2BB90106C5C"}, {"criteria": "cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E54D276-792B-40D2-B39B-5050028DE988"}, {"criteria": "cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC96D014-7CE2-4F61-BBAF-507829C542EA"}, {"criteria": "cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}, {"criteria": "cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BAE3D61-9D78-46D7-87EB-5A33ECF86F83"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCE246DE-641C-44A3-9FCC-5131655DBC1A"}, {"criteria": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"}, {"criteria": "cpe:2.3:o:nec:asl_ux_4800:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81B329CB-C41D-4487-A492-C34DC68899B6"}, {"criteria": "cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFDDBA47-A0E3-4EB2-868A-A9B998B0154E"}, {"criteria": "cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CF54267-A293-44B1-BD9A-14CD39F732C2"}, {"criteria": "cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "875BE14D-96DC-4973-B077-40C7DFC75B02"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}