Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-1999-0038

Buffer overflow in xlock program allows local users to execute commands as root.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 31.4%
CVSS Severity
CVSS v3 Score 8.4
CVSS v2 Score 7.2
Products affected by CVE-1999-0038
  • Data General » Dg Ux » Version: 1.0
    cpe:2.3:a:data_general:dg_ux:1.0
  • Data General » Dg Ux » Version: 2.0
    cpe:2.3:a:data_general:dg_ux:2.0
  • Data General » Dg Ux » Version: 3.0
    cpe:2.3:a:data_general:dg_ux:3.0
  • Data General » Dg Ux » Version: 4.0
    cpe:2.3:a:data_general:dg_ux:4.0
  • Data General » Dg Ux » Version: 5.0
    cpe:2.3:a:data_general:dg_ux:5.0
  • Data General » Dg Ux » Version: 6.0
    cpe:2.3:a:data_general:dg_ux:6.0
  • Data General » Dg Ux » Version: 7.0
    cpe:2.3:a:data_general:dg_ux:7.0
  • Bsdi » Bsd Os » Version: 2.1
    cpe:2.3:o:bsdi:bsd_os:2.1
  • Debian » Debian Linux » Version: 0.93
    cpe:2.3:o:debian:debian_linux:0.93
  • Debian » Debian Linux » Version: 1.1
    cpe:2.3:o:debian:debian_linux:1.1
  • Debian » Debian Linux » Version: 1.2
    cpe:2.3:o:debian:debian_linux:1.2
  • Debian » Debian Linux » Version: 1.3
    cpe:2.3:o:debian:debian_linux:1.3
  • Hp » Hp-Ux » Version: 10.00
    cpe:2.3:o:hp:hp-ux:10.00
  • Hp » Hp-Ux » Version: 10.01
    cpe:2.3:o:hp:hp-ux:10.01
  • Hp » Hp-Ux » Version: 10.08
    cpe:2.3:o:hp:hp-ux:10.08
  • Hp » Hp-Ux » Version: 10.10
    cpe:2.3:o:hp:hp-ux:10.10
  • Hp » Hp-Ux » Version: 10.16
    cpe:2.3:o:hp:hp-ux:10.16
  • Hp » Hp-Ux » Version: 10.20
    cpe:2.3:o:hp:hp-ux:10.20
  • Hp » Hp-Ux » Version: 10.24
    cpe:2.3:o:hp:hp-ux:10.24
  • Hp » Hp-Ux » Version: 10.30
    cpe:2.3:o:hp:hp-ux:10.30
  • Hp » Hp-Ux » Version: 10.34
    cpe:2.3:o:hp:hp-ux:10.34
  • Ibm » Aix » Version: 3.2
    cpe:2.3:o:ibm:aix:3.2
  • Ibm » Aix » Version: 4.1
    cpe:2.3:o:ibm:aix:4.1
  • Ibm » Aix » Version: 4.2
    cpe:2.3:o:ibm:aix:4.2
  • Sgi » Irix » Version: 5.0
    cpe:2.3:o:sgi:irix:5.0
  • Sgi » Irix » Version: 5.0.1
    cpe:2.3:o:sgi:irix:5.0.1
  • Sgi » Irix » Version: 5.1
    cpe:2.3:o:sgi:irix:5.1
  • Sgi » Irix » Version: 5.1.1
    cpe:2.3:o:sgi:irix:5.1.1
  • Sgi » Irix » Version: 5.2
    cpe:2.3:o:sgi:irix:5.2
  • Sgi » Irix » Version: 5.3
    cpe:2.3:o:sgi:irix:5.3
  • Sgi » Irix » Version: 6.0
    cpe:2.3:o:sgi:irix:6.0
  • Sgi » Irix » Version: 6.0.1
    cpe:2.3:o:sgi:irix:6.0.1
  • Sgi » Irix » Version: 6.1
    cpe:2.3:o:sgi:irix:6.1
  • Sgi » Irix » Version: 6.3
    cpe:2.3:o:sgi:irix:6.3
  • Sgi » Irix » Version: 6.4
    cpe:2.3:o:sgi:irix:6.4
  • Sun » Solaris » Version: 2.4
    cpe:2.3:o:sun:solaris:2.4
  • Sun » Solaris » Version: 2.5
    cpe:2.3:o:sun:solaris:2.5
  • Sun » Solaris » Version: 2.5.1
    cpe:2.3:o:sun:solaris:2.5.1
  • Sun » Sunos » Version: 5.3
    cpe:2.3:o:sun:sunos:5.3
  • Sun » Sunos » Version: 5.4
    cpe:2.3:o:sun:sunos:5.4
  • Sun » Sunos » Version: 5.5
    cpe:2.3:o:sun:sunos:5.5
  • Sun » Sunos » Version: 5.5.1
    cpe:2.3:o:sun:sunos:5.5.1


Contact Us

Shodan ® - All rights reserved