40 results (0.016 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 2

The ps (/usr/ucb/ps) command on HP Tru64 UNIX 5.1 1885 allows local users to obtain sensitive information, including environment variables of arbitrary processes, via the "auxewww" argument, a similar issue to CVE-1999-1587. El comando ps (/usr/ucb/ps) en el HP Tru64 UNIX 5.1 1885 permite a usuarios locales obtener información sensible incluyendo variables de entorno de procesos de su elección, mediante el argumento "auxewww". Similar a la vulnerabilidad CVE-1999-1587. • https://www.exploit-db.com/exploits/3273 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00817515 http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052227.html http://osvdb.org/33113 http://rawlab.mindcreations.com/codes/exp/nix/osf1tru64ps.ksh http://secunia.com/advisories/24041 http://secunia.com/advisories/25135 http://securitytracker.com/id?1017592 http://www.securityfocus.com/archive/1/459266/100/0/threaded http://www.securityfocus.com/ar •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in the POSIX Threads library (libpthread) on HP Tru64 UNIX 4.0F PK8, 4.0G PK4, and 5.1A PK6 allows local users to gain root privileges via a long PTHREAD_CONFIG environment variable. Desbordamiento de búfer en la biblioteca POSIX Threads (libpthread) sobre HP Tru64 UNIX 4.0F PK8, 4.0G PK4, y 5.1A PK6 permite a un usuario local ganar privilegios de root a través de una variable de entorno PTHREAD_CONFIG larga. • http://secunia.com/advisories/22743 http://securitytracker.com/id?1017211 http://www.netragard.com/pdfs/research/HP-TRU64-LIBPTHREAD-20060811.txt http://www.securityfocus.com/bid/21035 http://www.vupen.com/english/advisories/2006/4483 http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00800193 https://exchange.xforce.ibmcloud.com/vulnerabilities/30178 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 17EXPL: 0

Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument. Desbordamiento de búfer en dtmail en HP Tru64 UNIX 4.0F hasta 5.1B, y HP-UX B.11.00 hasta B.11.23 permite a usuarios locales ejecutar código de su elección mediante un argumento -a (o attachment) muy largo. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00793091 http://secunia.com/advisories/22451 http://secunia.com/advisories/22528 http://securitytracker.com/id?1017083 http://securitytracker.com/id?1017098 http://securitytracker.com/id?1017099 http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt http://www.securityfocus.com/archive/1/449321/100/0/threaded http://www.securityfocus.com/bid/20580 http://www.vupen.com/english/advisories/2006/4139 http&# •

CVSS: 1.7EPSS: 0%CPEs: 6EXPL: 0

Unspecified vulnerability in the FTP Daemon (ftpd) for HP Tru64 UNIX 4.0F PK8 and other versions up to HP Tru64 UNIX 5.1B-3, and HP-UX B.11.00, B.11.04, B.11.11, and B.11.23, allows remote authenticated users to cause a denial of service (hang). • http://secunia.com/advisories/18543 http://secunia.com/advisories/18569 http://securityreason.com/securityalert/360 http://securitytracker.com/id?1015506 http://support.avaya.com/elmodocs2/security/ASA-2006-018.htm http://www.securityfocus.com/archive/1/422391/100/0/threaded http://www.securityfocus.com/bid/16316 http://www.vupen.com/english/advisories/2005/1801 http://www.vupen.com/english/advisories/2006/0264 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01227& •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

Unknown vulnerability in the systems message queue in HP Tru64 Unix 4.0F PK8 through 5.1B-2/PK4 allows local users to cause a denial of service (process crash) for processes such as nfsstat, pfstat, arp, ogated, rarpd, route, sendmail, srconfig, strsetup, trpt, netstat, and xntpd. • http://marc.info/?l=bugtraq&m=111040492127482&w=2 http://secunia.com/advisories/14549 http://www.securityfocus.com/bid/12768 https://exchange.xforce.ibmcloud.com/vulnerabilities/19642 •