CVE-2002-2002
https://notcve.org/view.php?id=CVE-2002-2002
Buffer overflow in libc in Compaq Tru64 4.0F, 5.0, 5.1 and 5.1A allows attackers to execute arbitrary code via long (1) LANG and (2) LOCPATH environment variables. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00219.html http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml http://www.iss.net/security_center/static/8863.php http://www.lac.co.jp/security/english/snsadv_e/51_e.html http://www.securityfocus.com/bid/4544 •
CVE-2002-2003
https://notcve.org/view.php?id=CVE-2002-2003
ypbind in Compaq Tru64 4.0F, 4.0G, 5.0A, 5.1 and 5.1A allows remote attackers to cause the process to core dump via certain network packets generated by nmap. • http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml •
CVE-2002-2264
https://notcve.org/view.php?id=CVE-2002-2264
Unspecified vulnerability in Internet Group Management Protocol (IGMP) of HP Tru64 4.0F through 5.1A allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: this might be the same issue as CVE-2002-2185, but there are insufficient details to be certain. • http://archives.neohapsis.com/archives/compaq/2002-q4/0013.html •
CVE-2002-1202
https://notcve.org/view.php?id=CVE-2002-1202
Unknown vulnerability in routed for HP Tru64 UNIX V4.0F through V5.1A allows local and remote attackers to read arbitrary files. Vulnerabilidad desconocida en el demonio routed de HP Tru84 UNIX V4.0F a V5.1A permite a atacantes locales y remotos leer ficheros arbitrarios. • http://archives.neohapsis.com/archives/tru64/2002-q4/0002.html http://www.iss.net/security_center/static/10316.php http://www.securityfocus.com/bid/5913 •
CVE-2002-1129 – HP Tru64/OSF1 DXTerm - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-1129
Buffer overflow in dxterm allows local users to execute arbitrary code via a long -xrm argument. • https://www.exploit-db.com/exploits/21807 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0122.html http://marc.info/?l=bugtraq&m=103248659816294&w=2 http://www.iss.net/security_center/static/10148.php http://www.securityfocus.com/bid/5746 •