Page 21 of 111 results (0.005 seconds)

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 0

rpcbind in HP-UX 11.00, 11.04 and 11.11 allows remote attackers to cause a denial of service (core dump) via a malformed RPC portmap requests, possibly related to a buffer overflow. • http://www.ciac.org/ciac/bulletins/m-003.shtml http://www.securityfocus.com/advisories/3586 http://www.securityfocus.com/bid/3400 https://exchange.xforce.ibmcloud.com/vulnerabilities/7221 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5683 •

CVSS: 7.5EPSS: 3%CPEs: 5EXPL: 0

Buffer overflow in line printer daemon (rlpdaemon) in HP-UX 10.01 through 11.11 allows remote attackers to execute arbitrary commands. • http://archives.neohapsis.com/archives/hp/2001-q3/0047.html http://www.cert.org/advisories/CA-2001-30.html http://www.ciac.org/ciac/bulletins/l-134.shtml http://www.kb.cert.org/vuls/id/966075 http://www.securityfocus.com/bid/3240 http://xforce.iss.net/alerts/advise93.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6811 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in login in HP-UX 11.00, 11.11, and 10.20 allows restricted shell users to bypass certain security checks and gain privileges. • http://archives.neohapsis.com/archives/hp/2001-q3/0014.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5657 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 2

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •

CVSS: 1.2EPSS: 0%CPEs: 3EXPL: 0

kmmodreg in HP-UX 11.11, 11.04 and 11.00 allows local users to create arbitrary world-writeable files via a symlink attack on the (1) /tmp/.kmmodreg_lock and (2) /tmp/kmpath.tmp temporary files. • http://ciac.llnl.gov/ciac/bulletins/l-093.shtml http://online.securityfocus.com/advisories/3354 http://www.kb.cert.org/vuls/id/127435 http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92 http://www.securityfocus.com/archive/1/188568 http://www.securityfocus.com/bid/2821 https://exchange.xforce.ibmcloud.com/vulnerabilities/6656 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5628 •