Page 18 of 166 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

JFS (JFS3.1 and OnlineJFS) in HP-UX 10.20, 11.00, and 11.04 does not properly implement the sticky bit functionality, which could allow attackers to bypass intended restrictions on filesystems. • http://www.kb.cert.org/vuls/id/248337 http://www.securityfocus.com/advisories/4569 http://www.securityfocus.com/bid/5979 https://exchange.xforce.ibmcloud.com/vulnerabilities/10399 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5700 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to execute arbitrary code via (1) msgchk or (2) .upd..loader. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/506441 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in mailcv in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://ftp.support.compaq.com.au/pub/patches/Digital_UNIX/v5.1a/patch_kit/Tru64_UNIX_V5.1A/doc/txt/OSFPAT00131500520.txt http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/408771 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in ps in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/173977 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 2

Buffer overflow in HP Tru64 UNIX allows local users to execute arbitrary code via a long argument to /usr/bin/at. • https://www.exploit-db.com/exploits/281 https://github.com/wlensinas/CVE-2002-1614 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/435611 http://www.securityfocus.com/archive/1/290115 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •