Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
hp-ux vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2002-1605
Buffer overflow in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows malicious users to execute arbitrary code via a long _XKB_CHARSET environment variable to (1) dxpause, (2) dxconsole, or (3) dtsession.
Hp Hp-ux 10.20
Hp Tru64 5.0a
Hp Tru64 5.1
Hp Hp-ux 11.11
Hp Hp-ux 11.22
Hp Tru64 4.0f
Hp Tru64 4.0g
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Tru64 5.1a
1 EDB exploit
755
VMScore
CVE-1999-0502
A Unix account has a default, null, blank, or missing password.
Sun Sunos 5.7
Hp Hp-ux 11
Sun Sunos 5.8
Sun Sunos 5.5.1
Hp Hp-ux 10.20
Redhat Linux 6.0
Sun Solaris 2.6
1 EDB exploit
745
VMScore
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
Sgi Irix 5.3
Sgi Irix 4.0
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 5.3
Hp Hp-ux 10.30
Nec Ews-ux V 4.2mp
Hp Hp-ux 9.10
Sun Sunos 4.1.4
Hp Hp-ux 10.01
Sun Solaris 2.4
Hp Hp-ux 10.00
Sun Solaris 2.5.1
Hp Hp-ux 9.00
Nec Ews-ux V 4.2
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Sun Sunos 5.4
5 EDB exploits
730
VMScore
CVE-2003-1359
Buffer overflow in stmkfont utility of HP-UX 10.0 up to and including 11.22 allows local users to gain privileges via a long command line argument.
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.08
Hp Hp-ux 10.09
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 11.20
Hp Hp-ux 11.22
Hp Hp-ux 10.00
Hp Hp-ux 10.01
Hp Hp-ux 10.26
Hp Hp-ux 10.30
Hp Hp-ux 10.34
Avaya Predictive Dialer System 12
Avaya Predictive Dialer System 9.0
Avaya Predictive Dialer System 11
2 EDB exploits
730
VMScore
CVE-2001-0979
Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument.
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Hp Hp-ux 10.20
Hp Hp-ux 11.00
2 EDB exploits
730
VMScore
CVE-2000-1134
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Conectiva Linux 4.0
Conectiva Linux 4.0es
Immunix Immunix 6.2
Conectiva Linux 4.1
Conectiva Linux 4.2
Conectiva Linux 5.0
Conectiva Linux 5.1
Caldera Openlinux Eserver 2.3
Hp Hp-ux 11.11
Redhat Linux 6.0
Redhat Linux 6.1
Caldera Openlinux
Caldera Openlinux Edesktop 2.4
Mandrakesoft Mandrake Linux 7.2
Redhat Linux 5.2
Mandrakesoft Mandrake Linux 6.0
Mandrakesoft Mandrake Linux 6.1
Redhat Linux 6.2
Redhat Linux 6.2e
Mandrakesoft Mandrake Linux 7.0
Mandrakesoft Mandrake Linux 7.1
Suse Suse Linux 7.0
2 EDB exploits
730
VMScore
CVE-2000-1028
Buffer overflow in cu program in HP-UX 11.0 may allow local users to gain privileges via a long -l command line argument.
Hp Hp-ux 11.00
Hp Hp-ux 9.00
Hp Hp-ux 9.09
Hp Hp-ux 9.10
Hp Hp-ux 9.01
Hp Hp-ux 9.04
Hp Hp-ux 9.05
Hp Hp-ux 9.06
Hp Hp-ux 10.20
Hp Hp-ux 9.07
Hp Hp-ux 9.08
2 EDB exploits
730
VMScore
CVE-1999-0306
buffer overflow in HP xlock program.
Hp Vvos 10.24
2 EDB exploits
730
VMScore
CVE-1999-0030
root privileges via buffer overflow in xlock command on SGI IRIX systems.
Sgi Irix
2 EDB exploits
730
VMScore
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
Data General Dg Ux 3.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Data General Dg Ux 5.0
Sgi Irix 6.1
Data General Dg Ux 1.0
Sgi Irix 5.0.1
Data General Dg Ux 4.0
Sgi Irix 5.1.1
Data General Dg Ux 2.0
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Data General Dg Ux 6.0
Sgi Irix 5.2
Data General Dg Ux 7.0
Sgi Irix 6.3
Sgi Irix 6.0
Sun Sunos 5.3
Hp Hp-ux 10.30
Debian Debian Linux 0.93
Hp Hp-ux 10.01
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »