Page 20 of 222 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain privileges via (1) lpc, (2) lpd, (3) lpq, (4) lpr, or (5) lprm. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/293305 http://www.kb.cert.org/vuls/id/557481 http://www.kb.cert.org/vuls/id/651377 http://www.kb.cert.org/vuls/id/955065 http://www.kb.cert.org/vuls/id/965097 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in binmail in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/602009 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 2.1EPSS: 0%CPEs: 10EXPL: 0

Unknown vulnerability in ping in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to cause a denial of service. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00430.html http://www.kb.cert.org/vuls/id/612833 http://www.securityfocus.com/bid/5599 https://exchange.xforce.ibmcloud.com/vulnerabilities/10014 •

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in quot in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://ftp.support.compaq.com.au/pub/patches/Digital_UNIX/v5.1a/patch_kit/Tru64_UNIX_V5.1A/doc/txt/OSFPAT00131500520.txt http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/115731 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •