Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sco unixware 7.1.3 vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2003-0937
SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descrip...
Sco Unixware 7.1.3
Sco Unixware 7.1.1
Sco Open Unix 8.0
4.6
CVSSv2
CVE-2002-1323
Safe.pm 2.0.7 and previous versions, when used in Perl 5.8.0 and previous versions, may allow malicious users to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Safe.pm Safe.pm 2.0 7
Sun Linux 5.0.7
Sgi Irix 6.5.6
Sgi Irix 6.5.17f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.12
Sgi Irix 6.5.18f
Sgi Irix 6.5.19f
Sgi Irix 6.5.21f
Sgi Irix 6.5.9
Sgi Irix 6.5.21m
Sgi Irix 6.5.19
Sgi Irix 6.5.17m
Sgi Irix 6.5.20m
Sgi Irix 6.5.15
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.19m
Sgi Irix 6.5.20f
2.1
CVSSv2
CVE-2005-2132
RPC portmapper (rpcbind) in SCO UnixWare 7.1.1 m5, 7.1.3 mp5, and 7.1.4 mp2 allows remote attackers or local users to cause a denial of service (lack of response) via multiple invalid portmap requests.
Sco Unixware 7.1.1 M5
Sco Unixware 7.1.4 Mp2
Sco Unixware 7.1.3 Mp5
2.1
CVSSv2
CVE-2004-0996
main.c in cscope 15-4 and 15-5 creates temporary files with predictable filenames, which allows local users to overwrite arbitrary files via a symlink attack.
Cscope Cscope 15.5
Cscope Cscope 15.3
Cscope Cscope 13.0
Cscope Cscope 15.1
Cscope Cscope 15.4
Sco Unixware 7.1.3
Sco Unixware 7.1.4
Debian Debian Linux 3.0
Sco Unixware 7.1.1
Gentoo Linux
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2