Page 27 of 138 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Vulnerability in login in HP-UX 11.00, 11.11, and 10.20 allows restricted shell users to bypass certain security checks and gain privileges. • http://archives.neohapsis.com/archives/hp/2001-q3/0014.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5657 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

Dynamically Loadable Kernel Module (dlkm) static kernel symbol table in HP-UX 11.11 is not properly configured, which allows local users to gain privileges. • http://archives.neohapsis.com/archives/hp/2001-q3/0013.html http://ciac.llnl.gov/ciac/bulletins/l-115.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/6861 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5479 •

CVSS: 5.0EPSS: 1%CPEs: 29EXPL: 2

Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Vulnerability in the newgrp program included with HP9000 servers running HP-UX 11.11 allows a local attacker to obtain higher access rights. • http://archives.neohapsis.com/archives/hp/2001-q1/0101.html http://www.kb.cert.org/vuls/id/249224 http://www.osvdb.org/5681 https://exchange.xforce.ibmcloud.com/vulnerabilities/6282 •

CVSS: 1.2EPSS: 0%CPEs: 3EXPL: 0

kmmodreg in HP-UX 11.11, 11.04 and 11.00 allows local users to create arbitrary world-writeable files via a symlink attack on the (1) /tmp/.kmmodreg_lock and (2) /tmp/kmpath.tmp temporary files. • http://ciac.llnl.gov/ciac/bulletins/l-093.shtml http://online.securityfocus.com/advisories/3354 http://www.kb.cert.org/vuls/id/127435 http://www.kb.cert.org/vuls/id/TJSL-4Z5Q92 http://www.securityfocus.com/archive/1/188568 http://www.securityfocus.com/bid/2821 https://exchange.xforce.ibmcloud.com/vulnerabilities/6656 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5628 •