Page 28 of 222 results (0.003 seconds)

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 3

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable. • https://www.exploit-db.com/exploits/20386 http://www.securityfocus.com/archive/1/143845 http://www.securityfocus.com/bid/1919 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in dtterm in HP-UX 11.0 and HP Tru64 UNIX 4.0f through 5.1a allows local users to execute arbitrary code via a long -tn option. • http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://archives.neohapsis.com/archives/hp/2000-q4/0034.html http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/320067 http://www.securityfocus.com/archive/1/290115 http://www.securityfocus.com/archive/1/75188 http://www.securityfocus.com/bid/1889 https://exchange.xforce.ibmcloud.com/vulnerabilities/5461 •

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 4

Buffer overflow in cu program in HP-UX 11.0 may allow local users to gain privileges via a long -l command line argument. • https://www.exploit-db.com/exploits/20373 https://www.exploit-db.com/exploits/245 http://www.securityfocus.com/archive/1/142792 http://www.securityfocus.com/bid/1886 https://exchange.xforce.ibmcloud.com/vulnerabilities/5460 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 3

The net.init rc script in HP-UX 11.00 (S008net.init) allows local users to overwrite arbitrary files via a symlink attack that points from /tmp/stcp.conf to the targeted file. • https://www.exploit-db.com/exploits/20162 http://archives.neohapsis.com/archives/bugtraq/2000-08/0261.html http://www.securityfocus.com/bid/1602 https://exchange.xforce.ibmcloud.com/vulnerabilities/5131 •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 1

Format string vulnerability in ftpd in HP-UX 10.20 allows remote attackers to cause a denial of service or execute arbitrary commands via format strings in the PASS command. • https://www.exploit-db.com/exploits/212 http://archives.neohapsis.com/archives/bugtraq/2000-08/0028.html http://www.securityfocus.com/bid/1560 •