Filtered by vendor Sco Subscriptions
Total 129 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2003-0658 2 Caldera, Sco 4 Openlinux Server, Openlinux Workstation, Openserver and 1 more 2026-04-16 N/A
Docview before 1.1-18 in Caldera OpenLinux 3.1.1, SCO Linux 4.0, OpenServer 5.0.7, configures the Apache web server in a way that allows remote attackers to read arbitrary publicly readable files via a certain URL, possibly related to rewrite rules.
CVE-2000-0351 1 Sco 1 Unixware 2026-04-16 N/A
Some packaging commands in SCO UnixWare 7.1.0 have insecure privileges, which allows local users to add or remove software packages.
CVE-1999-0009 11 Bsdi, Caldera, Data General and 8 more 13 Bsd Os, Openlinux, Dg Ux and 10 more 2026-04-16 N/A
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVE-2003-0834 1 Sco 2 Open Unix, Unixware 2026-04-16 N/A
Buffer overflow in CDE libDtHelp library allows local users to execute arbitrary code via (1) a modified DTHELPUSERSEARCHPATH environment variable and the Help feature, (2) DTSEARCHPATH, or (3) LOGNAME.
CVE-2003-1021 1 Sco 1 Openserver 2026-04-16 N/A
The scosession program in OpenServer 5.0.6 and 5.0.7 allows local users to gain privileges via crafted strings on the commandline.
CVE-2001-1508 1 Sco 1 Openserver 2026-04-16 N/A
Buffer overflow in lpstat in SCO OpenServer 5.0 through 5.0.6a allows local users to execute arbitrary code as group bin via a long command line argument.
CVE-1999-0004 3 Hp, Sco, University Of Washington 3 Dtmail, Unixware, Pine 2026-04-16 N/A
MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.
CVE-1999-0033 5 Ibm, Ncr, Sco and 2 more 7 Aix, Mp-ras, Open Desktop and 4 more 2026-04-16 N/A
Command execution in Sun systems via buffer overflow in the at program.
CVE-2011-1432 1 Sco 1 Scoofficeserver 2025-04-11 N/A
The STARTTLS implementation in SCO SCOoffice Server does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.