Page 7 of 169 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 3

31 Dec 2003 — Buffer overflow in stmkfont utility of HP-UX 10.0 through 11.22 allows local users to gain privileges via a long command line argument. • https://www.exploit-db.com/exploits/22246 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2003 — Bastille B.02.00.00 of HP-UX 11.00 and 11.11 does not properly configure the (1) NOVRFY and (2) NOEXPN options in the sendmail.cf file, which could allow remote attackers to verify the existence of system users and expand defined sendmail aliases. • http://archives.neohapsis.com/archives/hp/2003-q1/0033.html • CWE-16: Configuration •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2003 — Buffer overflow in disable of HP-UX 11.0 may allow local users to execute arbitrary code via a long argument to the (1) -r or (2)-c options. • http://archives.neohapsis.com/archives/bugtraq/2003-02/0156.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 2

31 Dec 2003 — Buffer overflow in wall for HP-UX 10.20 through 11.11 may allow local users to execute arbitrary code by calling wall with a large file as an argument. • https://www.exploit-db.com/exploits/22231 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 0%CPEs: 34EXPL: 0

31 Dec 2003 — BEA WebLogic Express and WebLogic Server 7.0 and 7.0.0.1, stores passwords in plaintext when a keystore is used to store a private key or trust certificate authorities, which allows local users to gain access. • http://dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-25.jsp •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 4

31 Dec 2003 — Buffer overflow in rwrite for HP-UX 11.0 could allow local users to execute arbitrary code via a long argument. NOTE: the vendor was unable to reproduce the problem on a system that had been patched for an lp vulnerability (CVE-2002-1473). • https://www.exploit-db.com/exploits/22561 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.2EPSS: 15%CPEs: 58EXPL: 0

02 Dec 2003 — ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value. ISC BIND 8.3.x antes de 8.3.7, y 8.4.x antes de 8.4.3 permite a atacantes remotos envenenar la cache mediante un servidor de nombres malicioso que devuelve respuestas negativas con un valor TTL (time to live) largo. • ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/CSSA-2004-003.0.txt •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

18 Nov 2003 — Buffer overflow in the Software Distributor utilities for HP-UX B.11.00 and B.11.11 allows local users to execute arbitrary code via a long LANG environment variable to setuid programs such as (1) swinstall and (2) swmodify. Desbordamiento de búfer en los útiles Software Distributor de HP-UX B.11.00 y B.11.11 permite a usuarios locales ejecutar código arbitrario mediante una variable de entorno LANG larga en programas setuid como swinstall y swmodify. • https://www.exploit-db.com/exploits/23343 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

09 Oct 2003 — Buffer overflow in dtprintinfo on HP-UX 11.00, and possibly other operating systems, allows local users to gain root privileges via a long DISPLAY environment variable. Desbordamiento de búfer en dtprintinfo en HP-UX 11.00, y posiblemente otros sistemas operativos, permite a usuarios locales ganar privilegios de root mediante una varible de entorno DISPLAY larga. • https://www.exploit-db.com/exploits/23236 •

CVSS: 9.8EPSS: 13%CPEs: 105EXPL: 1

18 Sep 2003 — A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. Un "desbordamiento de búfer potencial en el análisis de reglas" (ruleset parsing) en Sendmail 8.12.9 cuando se usan los conjuntos de reglas no estándar: (1) receptor, (2) final, o (3) receptores de envoltorio específicos del enviador de correo, tienen consecuencias desconocidas. • https://www.exploit-db.com/exploits/23154 •