41 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 2

09 May 2007 — Unspecified vulnerability in dop in HP Tru64 UNIX 5.1B-4, 5.1B-3, and 5.1A PK6 allows local users to gain privileges via a large amount of data in the environment, as demonstrated by a long environment variable. Una vulnerabilidad no especificada en dop en HP Tru64 UNIX versiones 5.1B-4, 5.1B-3 y 5.1A PK6 permite a los usuarios locales alcanzar privilegios por medio de una gran cantidad de datos en el entorno, como es demostrado por una variable de entorno larga. • https://www.exploit-db.com/exploits/30017 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 2

07 Feb 2007 — The ps (/usr/ucb/ps) command on HP Tru64 UNIX 5.1 1885 allows local users to obtain sensitive information, including environment variables of arbitrary processes, via the "auxewww" argument, a similar issue to CVE-1999-1587. El comando ps (/usr/ucb/ps) en el HP Tru64 UNIX 5.1 1885 permite a usuarios locales obtener información sensible incluyendo variables de entorno de procesos de su elección, mediante el argumento "auxewww". Similar a la vulnerabilidad CVE-1999-1587. • https://www.exploit-db.com/exploits/3273 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

10 Dec 2006 — Buffer overflow in the POSIX Threads library (libpthread) on HP Tru64 UNIX 4.0F PK8, 4.0G PK4, and 5.1A PK6 allows local users to gain root privileges via a long PTHREAD_CONFIG environment variable. Desbordamiento de búfer en la biblioteca POSIX Threads (libpthread) sobre HP Tru64 UNIX 4.0F PK8, 4.0G PK4, y 5.1A PK6 permite a un usuario local ganar privilegios de root a través de una variable de entorno PTHREAD_CONFIG larga. • http://secunia.com/advisories/22743 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 17EXPL: 0

23 Oct 2006 — Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument. Desbordamiento de búfer en dtmail en HP Tru64 UNIX 4.0F hasta 5.1B, y HP-UX B.11.00 hasta B.11.23 permite a usuarios locales ejecutar código de su elección mediante un argumento -a (o attachment) muy largo. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00793091 •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

20 Sep 2005 — Unspecified vulnerability in the FTP Daemon (ftpd) for HP Tru64 UNIX 4.0F PK8 and other versions up to HP Tru64 UNIX 5.1B-3, and HP-UX B.11.00, B.11.04, B.11.11, and B.11.23, allows remote authenticated users to cause a denial of service (hang). • http://secunia.com/advisories/18543 •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

09 Mar 2005 — Unknown vulnerability in the systems message queue in HP Tru64 Unix 4.0F PK8 through 5.1B-2/PK4 allows local users to cause a denial of service (process crash) for processes such as nfsstat, pfstat, arp, ogated, rarpd, route, sendmail, srconfig, strsetup, trpt, netstat, and xntpd. • http://marc.info/?l=bugtraq&m=111040492127482&w=2 •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

31 Dec 2004 — Unspecified vulnerability in HP Tru64 UNIX 5.1B PK2(BL22) and PK3(BL24), and 5.1A PK6(BL24), when using IPsec/IKE (Internet Key Exchange) with Certificates, allows remote attackers to gain privileges via unknown attack vectors. • http://archives.neohapsis.com/archives/tru64/2004-q1/0004.html •

CVSS: 10.0EPSS: 0%CPEs: 19EXPL: 0

31 Dec 2003 — Unspecified vulnerability in CDE dtmailpr of HP Tru64 4.0F through 5.1B allows local users to gain privileges via unknown attack vectors. NOTE: due to lack of details in the vendor advisory, it is not clear whether this is the same issue as CVE-1999-0840. • http://secunia.com/advisories/9990 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.2EPSS: 15%CPEs: 58EXPL: 0

02 Dec 2003 — ISC BIND 8.3.x before 8.3.7, and 8.4.x before 8.4.3, allows remote attackers to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value. ISC BIND 8.3.x antes de 8.3.7, y 8.4.x antes de 8.4.3 permite a atacantes remotos envenenar la cache mediante un servidor de nombres malicioso que devuelve respuestas negativas con un valor TTL (time to live) largo. • ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2004-003.0/CSSA-2004-003.0.txt •

CVSS: 10.0EPSS: 75%CPEs: 163EXPL: 1

18 Sep 2003 — The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • https://packetstorm.news/files/id/180502 •