Page 5 of 40 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to execute arbitrary code via (1) msgchk or (2) .upd..loader. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/506441 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in mailcv in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://ftp.support.compaq.com.au/pub/patches/Digital_UNIX/v5.1a/patch_kit/Tru64_UNIX_V5.1A/doc/txt/OSFPAT00131500520.txt http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/408771 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in ps in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/173977 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 2

Buffer overflow in HP Tru64 UNIX allows local users to execute arbitrary code via a long argument to /usr/bin/at. • https://www.exploit-db.com/exploits/281 https://github.com/wlensinas/CVE-2002-1614 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/435611 http://www.securityfocus.com/archive/1/290115 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.5EPSS: 2%CPEs: 10EXPL: 2

Buffer overflow in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows attackers to execute arbitrary code via a long _XKB_CHARSET environment variable to (1) dxpause, (2) dxconsole, or (3) dtsession. • https://www.exploit-db.com/exploits/21774 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_xkb.txt http://www.kb.cert.org/vuls/id/569987 http://www.kb.cert.org/vuls/id/584243 http://www.kb.cert.org/vuls/id/693803 http://www.securityfocus.com/archive/1/290115 https://exchange.xforce.ibmcloud.com/v •