43 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the AdvFS showfile command in HP Tru64 UNIX 5.1B-3 and 5.1B-4 allows local users to gain privileges via unspecified vectors. Vulnerabilidad no específica en el comando showfile AdvFS en HP Tru64 UNIX v5.1B-3 y 5.1B-4 permite a usuarios locales para obtener privilegios a través de vectores no especificados. • http://marc.info/?l=bugtraq&m=122600765224240&w=2 http://secunia.com/advisories/32621 http://securityreason.com/securityalert/4567 http://securitytracker.com/alerts/2008/Nov/1021152.html http://www.securityfocus.com/bid/32160 http://www.vupen.com/english/advisories/2008/3050 https://exchange.xforce.ibmcloud.com/vulnerabilities/46414 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in the File-on-File Mounting File System (FFM) in HP Tru64 UNIX 5.1B-4 and 5.1B-3 allows local users to cause a denial of service (system crash) via unspecified vectors. Vulnerabilidad no especificada en File-on-File Mounting File System (FFM) en HP Tru64 UNIX 5.1B-4 y 5.1B-3 permite a usuarios locales provocar denegación de servicio (caida de demonio) a través de vectores no especificados. • http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01310389 http://secunia.com/advisories/28192 http://www.securityfocus.com/bid/26964 http://www.securitytracker.com/id?1019135 http://www.vupen.com/english/advisories/2007/4293 https://exchange.xforce.ibmcloud.com/vulnerabilities/39172 •

CVSS: 10.0EPSS: 11%CPEs: 2EXPL: 1

Unspecified vulnerability in the Secure Shell (SSH) in HP Tru64 UNIX 5.1B-4 and 5.1B-3 allows remote attackers to identify valid users via unspecified vectors, probably related to timing attacks and AuthInteractiveFailureRandomTimeout. Vulnerabilidad no especificada en Secure Shell (SSH) en HP Tru64 UNIX 5.1B-4 y 5.1B-3 permite a atacantes remotos identificar usuarios válidos a través de vectores no especificados, posiblemente relacionados con ataques oportunos y AuthInteractiveFailureRandomTimeout. • https://www.exploit-db.com/exploits/4032 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01007552 http://osvdb.org/36204 http://secunia.com/advisories/24036 http://www.securityfocus.com/bid/24021 http://www.securitytracker.com/id?1018065 http://www.vupen.com/english/advisories/2007/1851 https://exchange.xforce.ibmcloud.com/vulnerabilities/34329 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 2

Unspecified vulnerability in dop in HP Tru64 UNIX 5.1B-4, 5.1B-3, and 5.1A PK6 allows local users to gain privileges via a large amount of data in the environment, as demonstrated by a long environment variable. Una vulnerabilidad no especificada en dop en HP Tru64 UNIX versiones 5.1B-4, 5.1B-3 y 5.1A PK6 permite a los usuarios locales alcanzar privilegios por medio de una gran cantidad de datos en el entorno, como es demostrado por una variable de entorno larga. • https://www.exploit-db.com/exploits/30017 http://osvdb.org/36203 http://secunia.com/advisories/25197 http://www.orkaan.org/tru64/orkaan_-_exp_Tru64-5.X_SSRT071326.html http://www.securityfocus.com/archive/1/468103/100/0/threaded http://www.securityfocus.com/bid/23881 http://www.securitytracker.com/id?1018021 http://www.vupen.com/english/advisories/2007/1715 https://exchange.xforce.ibmcloud.com/vulnerabilities/34175 https://www2.itrc.hp.com/service/cki/docDisplay.do?d •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 2

The ps (/usr/ucb/ps) command on HP Tru64 UNIX 5.1 1885 allows local users to obtain sensitive information, including environment variables of arbitrary processes, via the "auxewww" argument, a similar issue to CVE-1999-1587. El comando ps (/usr/ucb/ps) en el HP Tru64 UNIX 5.1 1885 permite a usuarios locales obtener información sensible incluyendo variables de entorno de procesos de su elección, mediante el argumento "auxewww". Similar a la vulnerabilidad CVE-1999-1587. • https://www.exploit-db.com/exploits/3273 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00817515 http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052227.html http://osvdb.org/33113 http://rawlab.mindcreations.com/codes/exp/nix/osf1tru64ps.ksh http://secunia.com/advisories/24041 http://secunia.com/advisories/25135 http://securitytracker.com/id?1017592 http://www.securityfocus.com/archive/1/459266/100/0/threaded http://www.securityfocus.com/ar •