Page 7 of 40 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

Buffer overflow in quot in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges. • http://ftp.support.compaq.com.au/pub/patches/Digital_UNIX/v5.1a/patch_kit/Tru64_UNIX_V5.1A/doc/txt/OSFPAT00131500520.txt http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11 http://www.kb.cert.org/vuls/id/115731 https://exchange.xforce.ibmcloud.com/vulnerabilities/10016 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in ipcs for HP Tru64 UNIX 4.0f through 5.1a may allow attackers to execute arbitrary code, a different vulnerability than CVE-2001-0423. Desbordamientos de búfer en ipcs para HP Tru64 UNIX 4.0f a 5.1a puede permitir a atacantes ejecutar código arbitrario. • http://archives.neohapsis.com/archives/compaq/2002-q3/0010.html http://www.iss.net/security_center/static/9613.php http://www.kb.cert.org/vuls/id/771155 http://www.securityfocus.com/bid/5241 •

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in su in Tru64 Unix 5.x allows local users to gain root privileges via a long username and argument. • http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html http://marc.info/?l=bugtraq&m=102709593117171&w=2 http://www.iss.net/security_center/static/9640.php http://www.kb.cert.org/vuls/id/229867 http://www.securityfocus.com/bid/5272 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 2

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc. • https://www.exploit-db.com/exploits/259 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt http://www.kb.cert.org/vuls/id/137555 http://www.kb.cert.org/vuls/id/177067 http://www.kb.cert.org/vuls/id/193347 http://www.kb.cert.org/vuls/id/671627 http://www.kb.cert.org/vuls/id/864083 http://www.securityfocu •