CVE-2000-0095
https://notcve.org/view.php?id=CVE-2000-0095
The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier. • http://www.securityfocus.com/bid/944 http://www.securityfocus.com/templates/advisory.html?id=2041 •
CVE-1999-0693 – DIGITAL UNIX 4.0 d/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 / SunOS 4.1.4 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0693
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19501 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.securityfocus.com/bid/641 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4374 •
CVE-2000-0077 – HP-UX 10.x/11.x - Aserver PATH
https://notcve.org/view.php?id=CVE-2000-0077
The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands. • https://www.exploit-db.com/exploits/20396 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5549 •
CVE-2000-0078
https://notcve.org/view.php?id=CVE-2000-0078
The June 1999 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the awk command. • https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5728 •
CVE-1999-1573
https://notcve.org/view.php?id=CVE-1999-1573
Multiple unknown vulnerabilities in the "r-cmnds" (1) remshd, (2) rexecd, (3) rlogind, (4) rlogin, (5) remsh, (6) rcp, (7) rexec, and (8) rdist for HP-UX 10.00 through 11.00 allow attackers to gain privileges or access files. • http://www.auscert.org.au/render.html?it=490 http://www.ciac.org/ciac/bulletins/j-022.shtml http://www.kb.cert.org/vuls/id/13217 http://www.securityfocus.com/advisories/1471 https://exchange.xforce.ibmcloud.com/vulnerabilities/7860 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5550 •