Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp hp-ux 10.24 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0965
The NSAPI plugins for TGA and the Java Servlet proxy in HP-UX VVOS 10.24 and 11.04 allows an malicious user to cause a denial of service (high CPU utilization).
Hp Vvos 11.04
Hp Vvos 10.24
7.2
CVSSv2
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
7.5
CVSSv2
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Caldera Unixware 7
Caldera Unixware 7.1.1
Caldera Unixware 7.1 .0
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
10
CVSSv2
CVE-2003-0196
Multiple buffer overflows in Samba prior to 2.2.8a may allow remote malicious users to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
Samba-tng Samba-tng 0.3
Samba-tng Samba-tng 0.3.1
Samba Samba 2.0.5
Samba Samba 2.0.6
Samba Samba 2.2.3
Samba Samba 2.2.3a
Samba Samba 2.0.0
Samba Samba 2.0.1
Samba Samba 2.0.7
Samba Samba 2.0.8
Samba Samba 2.0.9
Samba Samba 2.2.4
Samba Samba 2.2.5
Samba Samba 2.0.10
Samba Samba 2.0.2
Samba Samba 2.2.0
Samba Samba 2.2.0a
Samba Samba 2.2.6
Samba Samba 2.2.7
Samba Samba 2.0.3
Samba Samba 2.0.4
Samba Samba 2.2.1a
10
CVSSv2
CVE-2003-0201
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x prior to 2.2.8a, 2.0.10 and previous versions 2.0.x versions, and Samba-TNG prior to 0.3.2, allows remote malicious users to execute arbitrary code.
Samba Samba 2.0.3
Samba Samba 2.0.4
Samba Samba 2.2.1a
Samba Samba 2.2.3a
Samba Samba 2.0.10
Samba Samba 2.0.2
Samba Samba 2.2.0
Samba Samba 2.2.0a
Samba Samba 2.2.7a
Samba Samba 2.2.8
Samba-tng Samba-tng 0.3
Samba-tng Samba-tng 0.3.1
Samba Samba 2.0.5
Samba Samba 2.0.6
Samba Samba 2.0.7
Samba Samba 2.2.4
Samba Samba 2.2.5
Samba Samba 2.0.0
Samba Samba 2.0.1
Samba Samba 2.0.8
Samba Samba 2.0.9
Samba Samba 2.2.6
12 EDB exploits
3 Github repositories
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4