Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
compaq tru64 4.0g vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2001-1093
Buffer overflow in msgchk in Digital UNIX 4.0G and previous versions allows local users to execute arbitrary code via a long command line argument.
Compaq Tru64 4.0e
Compaq Tru64 4.0f
Compaq Tru64 4.0d
Compaq Tru64 4.0g
1 EDB exploit
1 Github repository
5
CVSSv2
CVE-2002-2003
ypbind in Compaq Tru64 4.0F, 4.0G, 5.0A, 5.1 and 5.1A allows remote malicious users to cause the process to core dump via certain network packets generated by nmap.
Compaq Tru64 4.0f
Compaq Tru64 4.0g
Compaq Tru64 5.0a
Compaq Tru64 5.1
Compaq Tru64 5.1a
5
CVSSv2
CVE-2002-2004
portmapper in Compaq Tru64 4.0G and 5.0A allows remote malicious users to cause a denial of service via a flood of packets.
Compaq Tru64 5.0a
Compaq Tru64 4.0g
4.3
CVSSv2
CVE-2003-0914
ISC BIND 8.3.x prior to 8.3.7, and 8.4.x prior to 8.4.3, allows remote malicious users to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
Isc Bind 8.2.3
Isc Bind 8.3.2
Isc Bind 8.3.3
Nixu Namesurfer Suite 3.0.1
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 8.3.4
Isc Bind 8.3.5
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 8.4.1
Nixu Namesurfer Standard 3.0.1
Isc Bind 8.2.6
Isc Bind 8.2.7
Isc Bind 8.3.6
Isc Bind 8.4
Compaq Tru64 5.1
Compaq Tru64 5.1 Pk3 Bl17
Compaq Tru64 5.1a Pk3 Bl3
Compaq Tru64 5.1a Pk4 Bl21
Freebsd Freebsd 4.6
Freebsd Freebsd 4.6.2
2.1
CVSSv2
CVE-2001-1092
msgchk in Digital UNIX 4.0G and previous versions allows a local user to read the first line of arbitrary files via a symlink attack on the .mh_profile file.
Compaq Tru64 4.0f
Compaq Tru64 4.0g
Compaq Tru64 4.0d
Compaq Tru64 4.0e
1 EDB exploit
1 Github repository
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2