Page 5 of 46 results (0.006 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 2

Compaq Tru64 4.0 d allows remote attackers to cause a denial of service in (1) telnet, (2) FTP, (3) ypbind, (4) rpc.lockd, (5) snmp, (6) ttdbserverd, and possibly other services via a TCP SYN scan, as demonstrated using nmap. • https://www.exploit-db.com/exploits/21261 http://archives.neohapsis.com/archives/bugtraq/2002-01/0357.html http://www.iss.net/security_center/static/8040.php http://www.securityfocus.com/bid/4011 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in routed for HP Tru64 UNIX V4.0F through V5.1A allows local and remote attackers to read arbitrary files. Vulnerabilidad desconocida en el demonio routed de HP Tru84 UNIX V4.0F a V5.1A permite a atacantes locales y remotos leer ficheros arbitrarios. • http://archives.neohapsis.com/archives/tru64/2002-q4/0002.html http://www.iss.net/security_center/static/10316.php http://www.securityfocus.com/bid/5913 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 1

Buffer overflow in dxterm allows local users to execute arbitrary code via a long -xrm argument. • https://www.exploit-db.com/exploits/21807 http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0122.html http://marc.info/?l=bugtraq&m=103248659816294&w=2 http://www.iss.net/security_center/static/10148.php http://www.securityfocus.com/bid/5746 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to execute arbitrary code via (1) msgchk or (2) .upd..loader. • http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/506441 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in mailcv in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://ftp.support.compaq.com.au/pub/patches/Digital_UNIX/v5.1a/patch_kit/Tru64_UNIX_V5.1A/doc/txt/OSFPAT00131500520.txt http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/408771 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •