Page 23 of 157 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 4

Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument. • https://www.exploit-db.com/exploits/482 https://www.exploit-db.com/exploits/21098 http://www.securityfocus.com/archive/1/211687 http://www.securityfocus.com/bid/3279 https://exchange.xforce.ibmcloud.com/vulnerabilities/7078 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

asecure as included with HP-UX 10.01 through 11.00 can allow a local attacker to create a denial of service and gain additional privileges via unsafe permissions on the asecure program, a different vulnerability than CVE-2000-0083. • http://archives.neohapsis.com/archives/hp/2001-q1/0080.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5621 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in login in HP-UX 11.00, 11.11, and 10.20 allows restricted shell users to bypass certain security checks and gain privileges. • http://archives.neohapsis.com/archives/hp/2001-q3/0014.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5657 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 2

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •

CVSS: 1.2EPSS: 0%CPEs: 3EXPL: 0

kmmodreg in HP-UX 11.11, 11.04 and 11.00 allows local users to create arbitrary world-writeable files via a symlink attack on the (1) /tmp/.kmmodreg_lock and (2) /tmp/kmpath.tmp temporary files. • http://ciac.llnl.gov/ciac/bulletins/l-093.shtml http://online.securityfocus.com/advisories/3354 http://www.kb.cert.org/vuls/id/127435 http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92 http://www.securityfocus.com/archive/1/188568 http://www.securityfocus.com/bid/2821 https://exchange.xforce.ibmcloud.com/vulnerabilities/6656 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5628 •