Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F455C373-A9F7-47F9-828E-DEE2C8CC6545", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:data_engine:2000:*:*:*:*:*:*:*", "matchCriteriaId": "51ABD323-BF3F-4825-8788-8FCD614E83E4", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2AB95D7-394E-423B-884C-87A9960682EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "4355BA3D-B985-4DC7-AD9D-21B64652CC19", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "D590A237-1587-4FF2-BEEA-F96B1C08F84C", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "B004F338-1C8E-4283-8823-1A16A291FCBD", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "54EB3111-B93A-4577-9592-0D13FE7FD2C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A5D559EE-727C-405C-987C-247973A84D32", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*", "matchCriteriaId": "4A74EBC1-FD61-4DD1-AC8A-E4B0F333A980", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*", "matchCriteriaId": "4BC2A389-68BF-45B1-833D-96B331844424", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Microsoft SQL Server 7.0 and 2000, including Microsoft Data Engine (MSDE) 1.0 and Microsoft Desktop Engine (MSDE) 2000, writes output files for scheduled jobs under its own privileges instead of the entity that launched it, which allows attackers to overwrite system files, aka \"Flaw in Output File Handling for Scheduled Jobs.\""}, {"lang": "es", "value": "Microsoft SQL Server 7.0 y 2000, incluyendo Microsoft Data Engine (Motor de datos) (MSDE) 1.0, y Microsoft Desktop Engine (MSDE) 2000, escribe los ficheros de salida de tareas planificadas bajo sus propios privilegios, en vez de la entidad que lo lanz\u00f3, lo que permite a atacantes sobreescribir ficheros del sistema, tambi\u00e9n conociada como \"Fallo en Manejo de Fichero de Salida en Tareas Planificadas\""}], "id": "CVE-2002-1138", "lastModified": "2025-04-03T01:03:51.193", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2002-10-11T04:00:00.000", "references": [{"source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/n-003.shtml"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.iss.net/security_center/static/10257.php"}, {"source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-056"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/n-003.shtml"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.iss.net/security_center/static/10257.php"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-056"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}