Page 4 of 39 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in libc in Compaq Tru64 4.0F, 5.0, 5.1 and 5.1A allows attackers to execute arbitrary code via long (1) LANG and (2) LOCPATH environment variables. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/04/msg00219.html http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml http://www.iss.net/security_center/static/8863.php http://www.lac.co.jp/security/english/snsadv_e/51_e.html http://www.securityfocus.com/bid/4544 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in routed for HP Tru64 UNIX V4.0F through V5.1A allows local and remote attackers to read arbitrary files. Vulnerabilidad desconocida en el demonio routed de HP Tru84 UNIX V4.0F a V5.1A permite a atacantes locales y remotos leer ficheros arbitrarios. • http://archives.neohapsis.com/archives/tru64/2002-q4/0002.html http://www.iss.net/security_center/static/10316.php http://www.securityfocus.com/bid/5913 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 1

Buffer overflow in dxterm allows local users to execute arbitrary code via a long -xrm argument. • https://www.exploit-db.com/exploits/21807 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0122.html http://marc.info/?l=bugtraq&m=103248659816294&w=2 http://www.iss.net/security_center/static/10148.php http://www.securityfocus.com/bid/5746 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to execute arbitrary code via (1) msgchk or (2) .upd..loader. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/506441 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in mailcv in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://ftp.support.compaq.com.au/pub/patches/Digital_UNIX/v5.1a/patch_kit/Tru64_UNIX_V5.1A/doc/txt/OSFPAT00131500520.txt http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/408771 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •