Page 33 of 252 results (0.014 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in top in HP-UX 11.04 and earlier allows local users to overwrite files owned by the "sys" group. • http://archives.neohapsis.com/archives/hp/2000-q4/0079.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5773 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Buffer overflows in lpspooler in the fileset PrinterMgmt.LP-SPOOL of HP-UX 11.0 and earlier allows local users to gain privileges. • http://archives.neohapsis.com/archives/hp/2000-q4/0020.html http://www.osvdb.org/7244 https://exchange.xforce.ibmcloud.com/vulnerabilities/5379 •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 3

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable. • https://www.exploit-db.com/exploits/20386 http://www.securityfocus.com/archive/1/143845 http://www.securityfocus.com/bid/1919 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 3

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack. • https://www.exploit-db.com/exploits/217 https://www.exploit-db.com/exploits/20436 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350 http://distro.conectiva.com.br/atualizacoes/?id=a& •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 3

HP-UX 11.00 crontab allows local users to read arbitrary files via the -e option by creating a symlink to the target file during the crontab session, quitting the session, and reading the error messages that crontab generates. • https://www.exploit-db.com/exploits/195 https://www.exploit-db.com/exploits/20329 http://archives.neohapsis.com/archives/bugtraq/2000-10/0317.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5410 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •