Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp hp-ux 11.00 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0594
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when register_globals is enabled, allows remote malicious users to execute arbitrary code by triggering a memory_limit abort during execution of the zend_hash_init func...
Openpkg Openpkg 2.0
Trustix Secure Linux 2.0
Hp Hp-ux B.11.23
Openpkg Openpkg 2.1
Hp Hp-ux B.11.11
Avaya Converged Communications Server 2.0
Trustix Secure Linux 1.5
Hp Hp-ux B.11.00
Trustix Secure Linux 2.1
Debian Debian Linux 3.0
Hp Hp-ux B.11.22
Php Php 5.0.0
Php Php
1 EDB exploit
NA
CVE-2004-1764
Buffer overflow in CDE libDtSvc on HP-UX B.11.00, B.11.04, B.11.11, and B.11.22 allows local users to gain root privileges via unknown vectors.
Hp Hp-ux 11.22
Hp Hp-ux 11.4
Hp Hp-ux 11.00
Hp Hp-ux 11.11
NA
CVE-2003-1375
Buffer overflow in wall for HP-UX 10.20 up to and including 11.11 may allow local users to execute arbitrary code by calling wall with a large file as an argument.
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.20
Hp Hp-ux 11.00
1 EDB exploit
NA
CVE-2003-1087
Unknown vulnerability in diagmond and possibly other applications in HP9000 Series 700/800 running HP-UX B.11.00, B.11.04, B.11.11, and B.11.22 allows remote malicious users to cause a denial of service (program failure) via certain network traffic.
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 11.22
NA
CVE-2003-1097
Buffer overflow in rexec on HP-UX B.10.20, B.11.00, and B.11.04, when setuid root, may allow local users to gain privileges via a long -l option.
Hp Hp-ux 10.30
Hp Hp-ux 10.34
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 10.26
Hp Hp-ux 11.22
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 11.11
Hp Hp-ux 11.20
1 EDB exploit
NA
CVE-2003-1099
shar on HP-UX B.11.00, B.11.04, and B.11.11 creates temporary files with predictable names in /tmp, which allows local users to cause a denial of service and possibly execute arbitrary code via a symlink attack.
NA
CVE-2003-1359
Buffer overflow in stmkfont utility of HP-UX 10.0 up to and including 11.22 allows local users to gain privileges via a long command line argument.
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.08
Hp Hp-ux 10.09
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 11.20
Hp Hp-ux 11.22
Hp Hp-ux 10.00
Hp Hp-ux 10.01
Hp Hp-ux 10.26
Hp Hp-ux 10.30
Hp Hp-ux 10.34
Avaya Predictive Dialer System 12
Avaya Predictive Dialer System 9.0
Avaya Predictive Dialer System 11
2 EDB exploits
NA
CVE-2003-1461
Buffer overflow in rwrite for HP-UX 11.0 could allow local users to execute arbitrary code via a long argument. NOTE: the vendor was unable to reproduce the problem on a system that had been patched for an lp vulnerability (CVE-2002-1473).
Hp Hp-ux 11.00
1 EDB exploit
NA
CVE-2003-1356
The "file handling" in sort in HP-UX 10.01 up to and including 10.20, and 11.00 up to and including 11.11 is "incorrect," which allows malicious users to gain access or cause a denial of service via unknown vectors.
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 10.10
Hp Hp-ux 10.20
Hp Hp-ux 11.11
Hp Hp-ux 10.01
NA
CVE-2003-1358
rs.F300 for HP-UX 10.0 up to and including 11.22 uses the PATH environment variable to find and execute programs such as rm while operating at raised privileges, which allows local users to gain privileges by modifying the path to point to a malicious rm program.
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.09
Hp Hp-ux 10.10
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Hp Hp-ux 10.00
Hp Hp-ux 10.24
Hp Hp-ux 10.26
Hp Hp-ux 11.20
Hp Hp-ux 11.22
Hp Hp-ux 10.01
Hp Hp-ux 10.08
Hp Hp-ux 10.30
Hp Hp-ux 10.34
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »