Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp hp-ux 11.23 vulnerabilities and exploits
(subscribe to this query)
7.1
CVSSv2
CVE-2007-0396
Unspecified vulnerability in HP-UX B.11.23, when running IPFilter in combination with PHNE_34474, allows remote malicious users to cause a denial of service (system crash) via unspecified vectors.
Hp Hp-ux 11.23
2.1
CVSSv2
CVE-2005-3295
Unspecified vulnerability in HP-UX B.11.23 on Itanium platforms allows local users to cause a denial of service due to a "specific stack size."
Hp Hp-ux 11.23
7.5
CVSSv2
CVE-2003-0951
Partition Manager (parmgr) in HP-UX B.11.23 does not properly validate certificates that are provided by the cimserver, which allows malicious users to obtain sensitive data or gain privileges.
Hp Hp-ux 11.23
10
CVSSv2
CVE-2008-1662
Unspecified vulnerability in the HP System Administration Manager (SAM) on HP-UX B.11.11 and B.11.23, when used to configure NFS, might allow remote malicious users to read or modify arbitrary files, related to an "empty systems list."
Hp Hp-ux B.11.11
Hp Hp-ux B.11.23
Hp System Administration Manager
6.8
CVSSv2
CVE-2014-7874
Cross-site request forgery (CSRF) vulnerability in HP System Management Homepage (SMH) prior to 3.2.3 on HP-UX B.11.23, and prior to 3.2.8 on HP-UX B.11.31, allows remote malicious users to hijack the authentication of unspecified victims via unknown vectors.
Hp System Management Homepage
Hp Hp-ux B.11.23
Hp Hp-ux B.11.31
10
CVSSv2
CVE-2012-0131
Distributed Computing Environment (DCE) 1.8 and 1.9 on HP HP-UX B.11.11 and B.11.23 allows remote malicious users to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Hp Distributed Computing Environment 1.8
Hp Distributed Computing Environment 1.9
Hp Hp-ux B.11.23
Hp Hp-ux B.11.11
7.5
CVSSv2
CVE-2004-1332
Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote malicious users to execute arbitrary code via a long command request.
Hp Hp-ux 10.24
Hp Hp-ux 11.00
Hp Hp-ux Series 800 10.20
Hp Sis
Hp Hp-ux 10.10
Hp Hp-ux 10.20
Hp Hp-ux 11.4
Hp Hp-ux Series 700 10.20
Hp Hp-ux 10.01
Hp Hp-ux 11.22
Hp Hp-ux 11.23
Hp Hp-ux 11.11
Hp Hp-ux 11.11i
Hp Vvos 10.24
Hp Vvos 11.04
4.6
CVSSv2
CVE-2006-5452
Buffer overflow in dtmail on HP Tru64 UNIX 4.0F up to and including 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument.
Hp Tru64 4.0f
Hp Tru64 4.0g
Hp Tru64 5.1b
Hp Tru64 5.1b2
Hp Hp-ux 11.23
Hp Hp-ux 11.4
Hp Tru64 5.1a
Hp Tru64 5.1af
Hp Hp-ux 11.00
Hp Tru64 5.0a
Hp Tru64 5.1b3
Hp Hp-ux 11.11
Hp Hp-ux 11.22
Hp Tru64 5.1
5.1
CVSSv2
CVE-2004-0594
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote malicious users to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init func...
Openpkg Openpkg 2.0
Trustix Secure Linux 2.0
Hp Hp-ux B.11.23
Openpkg Openpkg 2.1
Hp Hp-ux B.11.11
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Hp Hp-ux B.11.00
Trustix Secure Linux 2.1
Debian Debian Linux 3.0
Hp Hp-ux B.11.22
Php Php 5.0.0
Php Php
1 EDB exploit
3.3
CVSSv2
CVE-2007-4590
The get_system_info command in Ignite-UX C.7.0 through C.7.3, and DynRootDisk (DRD) A.1.0.16.417 through A.2.0.0.592, on HP-UX B.11.11, B.11.23, and B.11.31 does not inform local users of networking changes made by the command, which has unknown impact and attack vectors.
Hp Dynrootdisk A.1.0.16.417
Hp Dynrootdisk A.2.0.0.592
Hp Dynrootdisk A.1.0.18.245
Hp Dynrootdisk A.1.1.0.344
Hp Hp-ux 11.23
Hp Hp-ux 11.31
Hp Hp-ux 11.11
Hp Ignite-ux C.7.1.92
Hp Ignite-ux C.7.2.93
Hp Ignite-ux C.7.3.144
Hp Ignite-ux C.7.0.212
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »