Page 5 of 43 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in Compaq ProLiant BL e-Class Integrated Administrator 1.0 and 1.10, allows authenticated users with Telnet, SSH, or console access to conduct unauthorized activities. • http://ftp.support.compaq.com/patches/.new/html/SSRT2179.shtml http://www.iss.net/security_center/static/9202.php http://www.securityfocus.com/bid/4802 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in ipcs for HP Tru64 UNIX 4.0f through 5.1a may allow attackers to execute arbitrary code, a different vulnerability than CVE-2001-0423. Desbordamientos de búfer en ipcs para HP Tru64 UNIX 4.0f a 5.1a puede permitir a atacantes ejecutar código arbitrario. • http://archives.neohapsis.com/archives/compaq/2002-q3/0010.html http://www.iss.net/security_center/static/9613.php http://www.kb.cert.org/vuls/id/771155 http://www.securityfocus.com/bid/5241 •

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in su in Tru64 Unix 5.x allows local users to gain root privileges via a long username and argument. • http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html http://marc.info/?l=bugtraq&m=102709593117171&w=2 http://www.iss.net/security_center/static/9640.php http://www.kb.cert.org/vuls/id/229867 http://www.securityfocus.com/bid/5272 •

CVSS: 10.0EPSS: 95%CPEs: 10EXPL: 2

The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida. • https://www.exploit-db.com/exploits/16395 https://www.exploit-db.com/exploits/16394 http://marc.info/?l=bugtraq&m=96333895000350&w=2 http://marc.info/?l=bugtraq&m=96593218804850&w=2 http://marc.info/?l=bugtraq&m=96644570412692&w=2 http://online.securityfocus.com/archive/1/273639 http://security-archive.merton.ox.ac.uk/bugtraq-200008/0233.html http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ313418 http://support.microsoft.com/default.aspx? •