Page 28 of 166 results (0.003 seconds)

CVSS: 10.0EPSS: 97%CPEs: 1EXPL: 7

The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command. • https://www.exploit-db.com/exploits/16311 https://www.exploit-db.com/exploits/20031 https://www.exploit-db.com/exploits/269 https://www.exploit-db.com/exploits/20032 https://www.exploit-db.com/exploits/201 https://www.exploit-db.com/exploits/239 https://www.exploit-db.com/exploits/20030 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:29.wu-ftpd.asc.v1.1 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2000.02 ftp://ftp.netbsd.org/pu •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 1

The snmpd.conf configuration file for the SNMP daemon (snmpd) in HP-UX 11.0 is world writable, which allows local users to modify SNMP configuration or gain privileges. • https://www.exploit-db.com/exploits/20002 http://www.securityfocus.com/bid/1327 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006070511.OAA05492%40dogfoot.hackerslab.org http://www.securityfocus.com/templates/archive.pike?list=1&msg=200006090640.XAA00779%40hpchs.cup.hp.com https://exchange.xforce.ibmcloud.com/vulnerabilities/4643 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

man in HP-UX 10.20 and 11 allows local attackers to overwrite files via a symlink attack. • https://www.exploit-db.com/exploits/19990 http://www.securityfocus.com/bid/1302 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.SOL.4.02.10006021014400.4779-100000%40nofud.nwest.attws.com •

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Vulnerability in shutdown command for HP-UX 11.X and 10.X allows allows local users to gain privileges via malformed input variables. • http://archives.neohapsis.com/archives/bugtraq/2000-05/0047.html http://www.securityfocus.com/bid/1214 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain additional privileges. • http://www.securityfocus.com/templates/advisory.html?id=2031 •