Page 3 of 43 results (0.001 seconds)

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 3

The UCX POP server in HP TCP/IP services for OpenVMS 4.2 through 5.3 allows local users to truncate arbitrary files via the -logfile command line option, which overrides file system permissions because the server runs with the SYSPRV and BYPASS privileges. El servidor UCX POP en HP TCP/IP services de OpenVMS 4.2 a 5.3 permite a usuarios locales truncar ficheros arbitrarios mediane la opción de línea de comandos, lo que domina sobre los permisos del sistema de ficheros porque el servidor corre con privilegios SYSPRV y BYPASS • https://www.exploit-db.com/exploits/21856 http://archives.neohapsis.com/archives/bugtraq/2002-10/0010.html http://archives.neohapsis.com/archives/compaq/2002-q4/0000.html http://online.securityfocus.com/archive/1/293070 http://www.iss.net/security_center/static/10236.php http://www.securityfocus.com/bid/5790 •

CVSS: 10.0EPSS: 17%CPEs: 111EXPL: 2

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. • https://www.exploit-db.com/exploits/24 https://www.exploit-db.com/exploits/22442 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614 http://lists.apple.com/mhonarc/secur •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

ACMS 4.3 and 4.4 in OpenVMS Alpha 7.2 and 7.3 does not properly use process privileges, which allows attackers to access data. • http://ftp.support.compaq.com/patches/.new/html/SSRT0813.shtml http://www.iss.net/security_center/static/8306.php http://www.securityfocus.com/bid/4184 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in libc in Compaq Tru64 4.0F, 5.0, 5.1 and 5.1A allows attackers to execute arbitrary code via long (1) LANG and (2) LOCPATH environment variables. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00219.html http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml http://www.iss.net/security_center/static/8863.php http://www.lac.co.jp/security/english/snsadv_e/51_e.html http://www.securityfocus.com/bid/4544 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

ypbind in Compaq Tru64 4.0F, 4.0G, 5.0A, 5.1 and 5.1A allows remote attackers to cause the process to core dump via certain network packets generated by nmap. • http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml •