Page 25 of 138 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in ndd for HP-UX 11.11 with certain TRANSPORT patches allows attackers to cause a denial of service. • http://archives.neohapsis.com/archives/hp/2002-q2/0034.html http://www.iss.net/security_center/static/9020.php http://www.securityfocus.com/bid/4680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5490 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The kernel in HP-UX 11.11 does not properly provide arguments for setrlimit, which could allow local attackers to cause a denial of service (kernel panic) and possibly gain privileges. El kernel de HP-UX 11.11 no da argumentos adecuados a setrlimit, lo que podría permitir a atacantes locales causar una denegación (kernel panic - pánico del kernel) y posiblemente ganar privilegios. • http://marc.info/?l=bugtraq&m=101372194225046&w=2 http://www.iss.net/security_center/static/8195.php http://www.kb.cert.org/vuls/id/726187 http://www.securityfocus.com/bid/4094 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5469 •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

setrlimit in HP-UX 10.01, 10.10, 10.24, 10.20, 11.00, 11.04 and 11.11 does not properly enforce core file size on processes after setuid or setgid privileges are dropped, which could allow local users to cause a denial of service by exhausting available disk space. • http://archives.neohapsis.com/archives/hp/2001-q3/0000.html http://www.iss.net/security_center/static/6810.php http://www.securityfocus.com/bid/3416 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5159 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

RLPDaemon in HP-UX 10.20 and 11.0 allows local users to overwrite arbitrary files and gain privileges by specifying the target file in the -L option. RLPDaemon en HP-UX 10.20 y 11.0 permite a usuarios locales la sobreescritura de ficheros arbitrarios y la obtención de privilegios, especificando el fichero objeto en la opción '-L'. • http://www.iss.net/security_center/static/7729.php http://www.securityfocus.com/archive/1/245690 http://www.securityfocus.com/bid/3701 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5763 •

CVSS: 10.0EPSS: 97%CPEs: 43EXPL: 9

Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •