Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp hp-ux 10.30 vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2000-0095
The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote malicious users to cause the system to be used as a packet amplifier.
Hp Hp-ux 11.00
Hp Hp-ux 10.30
409
VMScore
CVE-1999-0326
Vulnerability in HP-UX mediainit program.
Hp Hp-ux 9
Hp Hp-ux 10.10
Hp Hp-ux 10.30
Hp Hp-ux 10.01
Hp Hp-ux 10.20
890
VMScore
CVE-1999-1573
Multiple unknown vulnerabilities in the "r-cmnds" (1) remshd, (2) rexecd, (3) rlogind, (4) rlogin, (5) remsh, (6) rcp, (7) rexec, and (8) rdist for HP-UX 10.00 up to and including 11.00 allow malicious users to gain privileges or access files.
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Hp Hp-ux 10.20
Hp Hp-ux 10.30
Hp Hp-ux 11.00
Hp Hp-ux 10.00
445
VMScore
CVE-1999-1213
Vulnerability in telnet service in HP-UX 10.30 allows malicious users to cause a denial of service.
Hp Hp-ux 10.30
641
VMScore
CVE-2003-1360
Buffer overflow in the setupterm function of (1) lanadmin and (2) landiag programs of HP-UX 10.0 up to and including 10.34 allows local users to execute arbitrary code via a long TERM environment variable.
Hp Hp-ux 10.00
Hp Hp-ux 10.01
Hp Hp-ux 10.26
Hp Hp-ux 10.30
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 10.08
Hp Hp-ux 10.09
Hp Hp-ux 10.34
Hp Hp-ux 10.10
Hp Hp-ux 10.16
725
VMScore
CVE-2003-1097
Buffer overflow in rexec on HP-UX B.10.20, B.11.00, and B.11.04, when setuid root, may allow local users to gain privileges via a long -l option.
Hp Hp-ux 10.30
Hp Hp-ux 10.34
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 10.26
Hp Hp-ux 11.22
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 11.11
Hp Hp-ux 11.20
1 EDB exploit
445
VMScore
CVE-2002-2262
Unspecified vulnerability in xntpd of HP-UX 10.20 up to and including 11.11 allows remote malicious users to cause a denial of service (hang) via unknown attack vectors.
Hp Hp-ux 10.08
Hp Hp-ux 10.09
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 10
Hp Hp-ux 10.03
Hp Hp-ux 10.34
Hp Hp-ux 11
Hp Hp-ux 11.0.4
Hp Hp-ux 10.26
Hp Hp-ux 10.30
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 11.11
Hp Hp-ux 11.11i
725
VMScore
CVE-2003-1358
rs.F300 for HP-UX 10.0 up to and including 11.22 uses the PATH environment variable to find and execute programs such as rm while operating at raised privileges, which allows local users to gain privileges by modifying the path to point to a malicious rm program.
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.09
Hp Hp-ux 10.10
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Hp Hp-ux 10.00
Hp Hp-ux 10.24
Hp Hp-ux 10.26
Hp Hp-ux 11.20
Hp Hp-ux 11.22
Hp Hp-ux 10.01
Hp Hp-ux 10.08
Hp Hp-ux 10.30
Hp Hp-ux 10.34
1 EDB exploit
730
VMScore
CVE-2003-1359
Buffer overflow in stmkfont utility of HP-UX 10.0 up to and including 11.22 allows local users to gain privileges via a long command line argument.
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.08
Hp Hp-ux 10.09
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 11.20
Hp Hp-ux 11.22
Hp Hp-ux 10.00
Hp Hp-ux 10.01
Hp Hp-ux 10.26
Hp Hp-ux 10.30
Hp Hp-ux 10.34
Avaya Predictive Dialer System 12
Avaya Predictive Dialer System 9.0
Avaya Predictive Dialer System 11
2 EDB exploits
505
VMScore
CVE-1999-0015
Teardrop IP denial of service.
Hp Hp-ux 10.01
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 9.04
Hp Hp-ux 9.05
Microsoft Windows Nt 4.0
Hp Hp-ux 11.00
Hp Hp-ux 9.00
Microsoft Windows Nt 3.5.1
Netbsd Netbsd 1.2
Netbsd Netbsd 1.2.1
Hp Hp-ux 10
Hp Hp-ux 9.01
Hp Hp-ux 9.03
Sun Sunos 4.1.3u1
Sun Sunos 4.1.4
Hp Hp-ux 10.24
Hp Hp-ux 10.30
Hp Hp-ux 9.07
Microsoft Windows 95 0.0a
Netbsd Netbsd 1.0
Netbsd Netbsd 1.1
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »