Product:

Unixware

(Sco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 66
Date Id Summary Products Score Patch Annotated
2003-12-15 CVE-2003-0937 SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user. Open_unix, Unixware N/A
1998-12-02 CVE-1999-0836 UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack. Unixware N/A
1999-12-03 CVE-1999-0864 UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file. Unixware N/A
2000-02-15 CVE-2000-0224 ARCserve agent in SCO UnixWare 7.x allows local attackers to gain root privileges via a symlink attack. Unixware N/A
2000-02-16 CVE-2000-0154 The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack. Unixware N/A
1996-04-18 CVE-1999-0078 pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. Bsd_os, Freebsd, Hp\-Ux, Aix, Mp\-Ras, Up\-Ux_v, Nextstep, Openserver, Unixware, Irix, Sunos N/A