Show plain JSON{"id": "CVE-2001-0736", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 2.1, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "LOW", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2001-10-18T04:00:00.000", "references": [{"url": "http://marc.info/?l=bugtraq&m=98749102621604&w=2", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=99106787825229&w=2", "source": "cve@mitre.org"}, {"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-047.php3?dis=8.0", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.redhat.com/support/errata/RHSA-2001-042.html", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6367", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=98749102621604&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=99106787825229&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-047.php3?dis=8.0", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.redhat.com/support/errata/RHSA-2001-042.html", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6367", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}], "descriptions": [{"lang": "en", "value": "Vulnerability in (1) pine before 4.33 and (2) the pico editor, included with pine, allows local users local users to overwrite arbitrary files via a symlink attack."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB0F79BE-8EBF-44D8-83A1-9331669BED54"}, {"criteria": "cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660CA978-FDA1-4D48-8162-9CB9243A1B7E"}, {"criteria": "cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A2889C6-8DE0-4432-812A-F2A5C4A08897"}, {"criteria": "cpe:2.3:a:university_of_washington:pine:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12627ECC-CFED-4893-8C1C-5CC454A982E1", "versionEndIncluding": "4.33"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:engardelinux:secure_linux:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79A6E38E-9BC6-4CD7-ABC6-754C9DB07DB2"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC1FF5D-5EAB-44D5-B281-770547C70D68"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4371A667-18E1-4C54-B2E1-6F885F22F213"}, {"criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97E09AD9-F057-4264-88BB-A8A18C1B1246"}, {"criteria": "cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8EED385-8C39-4A40-A507-2EFE7652FB35"}, {"criteria": "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0633B5A6-7A88-4A96-9462-4C09D124ED36"}, {"criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}