Page 24 of 218 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in login in HP-UX 11.00, 11.11, and 10.20 allows restricted shell users to bypass certain security checks and gain privileges. • http://archives.neohapsis.com/archives/hp/2001-q3/0014.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5657 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 2

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

pcltotiff in HP-UX 10.x has unnecessary set group id permissions, which allows local users to cause a denial of service. • http://www.osvdb.org/2188 http://www.securityfocus.com/bid/2646 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0104-149 https://exchange.xforce.ibmcloud.com/vulnerabilities/6447 •

CVSS: 1.2EPSS: 0%CPEs: 3EXPL: 0

kmmodreg in HP-UX 11.11, 11.04 and 11.00 allows local users to create arbitrary world-writeable files via a symlink attack on the (1) /tmp/.kmmodreg_lock and (2) /tmp/kmpath.tmp temporary files. • http://ciac.llnl.gov/ciac/bulletins/l-093.shtml http://online.securityfocus.com/advisories/3354 http://www.kb.cert.org/vuls/id/127435 http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92 http://www.securityfocus.com/archive/1/188568 http://www.securityfocus.com/bid/2821 https://exchange.xforce.ibmcloud.com/vulnerabilities/6656 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5628 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings. • http://www.cert.org/advisories/CA-2001-07.html http://www.nai.com/research/covert/advisories/048.asp http://www.securityfocus.com/bid/2552 https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 • CWE-131: Incorrect Calculation of Buffer Size •