Page 13 of 110 results (0.008 seconds)

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 3

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable. • https://www.exploit-db.com/exploits/20386 http://www.securityfocus.com/archive/1/143845 http://www.securityfocus.com/bid/1919 •

CVSS: 10.0EPSS: 0%CPEs: 6EXPL: 0

Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service. • http://www.securityfocus.com/advisories/2850 http://www.securityfocus.com/bid/1954 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5655 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in dtterm in HP-UX 11.0 and HP Tru64 UNIX 4.0f through 5.1a allows local users to execute arbitrary code via a long -tn option. • http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://archives.neohapsis.com/archives/hp/2000-q4/0034.html http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/320067 http://www.securityfocus.com/archive/1/290115 http://www.securityfocus.com/archive/1/75188 http://www.securityfocus.com/bid/1889 https://exchange.xforce.ibmcloud.com/vulnerabilities/5461 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 4

Buffer overflow in cu program in HP-UX 11.0 may allow local users to gain privileges via a long -l command line argument. • https://www.exploit-db.com/exploits/20373 https://www.exploit-db.com/exploits/245 http://www.securityfocus.com/archive/1/142792 http://www.securityfocus.com/bid/1886 https://exchange.xforce.ibmcloud.com/vulnerabilities/5460 •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 1

Format string vulnerability in ftpd in HP-UX 10.20 allows remote attackers to cause a denial of service or execute arbitrary commands via format strings in the PASS command. • https://www.exploit-db.com/exploits/212 http://archives.neohapsis.com/archives/bugtraq/2000-08/0028.html http://www.securityfocus.com/bid/1560 •