Page 7 of 39 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in ipcs for HP Tru64 UNIX 4.0f through 5.1a may allow attackers to execute arbitrary code, a different vulnerability than CVE-2001-0423. Desbordamientos de búfer en ipcs para HP Tru64 UNIX 4.0f a 5.1a puede permitir a atacantes ejecutar código arbitrario. • http://archives.neohapsis.com/archives/compaq/2002-q3/0010.html http://www.iss.net/security_center/static/9613.php http://www.kb.cert.org/vuls/id/771155 http://www.securityfocus.com/bid/5241 •

CVSS: 10.0EPSS: 1%CPEs: 22EXPL: 0

Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure. Desbordamiento de búfer en el servidor de bases de datos RPC ToolTalk (rpc.ttdbserverd) de Common Desktop Environment (CDE) permite a atacantes remotos ejecutar código arbitrario mediante un argumento al procedimiento T_TT_CREATE_FILE. • http://marc.info/?l=bugtraq&m=102917002523536&w=2 http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F46366&zone_32=category%3Asecurity http://www-1.ibm.com/support/search.wss?rs=0&q=IY32792&apar=only http://www-1.ibm.com/support/search.wss?rs=0&q=IY32793&apar=only http://www.cert.org/advisories/CA-2002-26.html http://www.iss.net/security_center/static/9822.php http://www.kb.cert.org/vuls/id/387387 http://www.securityfocus.com/bid/5444 http:/&# •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflow in su in Tru64 Unix 5.x allows local users to gain root privileges via a long username and argument. • http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html http://marc.info/?l=bugtraq&m=102709593117171&w=2 http://www.iss.net/security_center/static/9640.php http://www.kb.cert.org/vuls/id/229867 http://www.securityfocus.com/bid/5272 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 2

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc. • https://www.exploit-db.com/exploits/259 http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt http://www.kb.cert.org/vuls/id/137555 http://www.kb.cert.org/vuls/id/177067 http://www.kb.cert.org/vuls/id/193347 http://www.kb.cert.org/vuls/id/671627 http://www.kb.cert.org/vuls/id/864083 http://www.securityfocu •

CVSS: 7.2EPSS: 1%CPEs: 47EXPL: 0

CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure. El servidor de bases de datos CDE ToolTalk (ttdbserver) permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque en enlaces simbólicos (symlink attack) en el fichero de registro (log) de transacciones usado por el procedimiento RPC _TT_TRANSACTION • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt ftp://patches.sgi.com/support/free/security/advisories/20021101-01-P http://archives.neohapsis.com/archives/aix/2002-q3/0002.html http://marc.info/?l=bugtraq&m=102635906423617&w=2 http://www.cert.org/advisories/CA-2002-20.html http://www.iss.net/security_center/static/9527.php http://www.kb.cert.org/vuls/id/299816 http://www.securityfocus.com/bid/5083 http://www1.itrc.hp •