Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
a ux vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-3164
Unspecified vulnerability in HP-UX Containers (formerly HP-UX Secure Resource Partitions (SRP)) A.03.00, A.03.00.002, and A.03.01, when running with patch PHKL_42310, allows local users to gain privileges via unknown vectors.
Hp Hp-ux Containers A.03.00
Hp Hp-ux Containers A.03.01
Hp Hp-ux Containers A.03.00.002
NA
CVE-2007-4590
The get_system_info command in Ignite-UX C.7.0 through C.7.3, and DynRootDisk (DRD) A.1.0.16.417 through A.2.0.0.592, on HP-UX B.11.11, B.11.23, and B.11.31 does not inform local users of networking changes made by the command, which has unknown impact and attack vectors.
Hp Dynrootdisk A.1.0.16.417
Hp Dynrootdisk A.2.0.0.592
Hp Dynrootdisk A.1.0.18.245
Hp Dynrootdisk A.1.1.0.344
Hp Hp-ux 11.23
Hp Hp-ux 11.31
Hp Hp-ux 11.11
Hp Ignite-ux C.7.1.92
Hp Ignite-ux C.7.2.93
Hp Ignite-ux C.7.3.144
Hp Ignite-ux C.7.0.212
5.9
CVSSv3
CVE-2016-1987
HPE IPFilter A.11.31.18.21 on HP-UX, when a certain keep-state configuration is enabled, allows remote malicious users to cause a denial of service via unspecified UDP packets.
Hp Hp-ux Ipfilter A.11.31.18.21
NA
CVE-2001-0311
Vulnerability in OmniBackII A.03.50 in HP 11.x and previous versions allows malicious users to gain unauthorized access to an OmniBack client.
Hp Omniback Ii A.03.50
Hp Hp-ux
3 EDB exploits
NA
CVE-1999-1102
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times.
Sgi Irix
Apple A Ux 2.0.1
Bsd Bsd 4.3
Sun Sunos
NA
CVE-1999-0138
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
Ibm Aix 4
Linux Linux Kernel 1.2.0
Nec Ews-ux V 4.2mp
Ibm Aix 3.2.5
Digital Osf 1 1.3
Freebsd Freebsd 2.0.5
Hp Hp-ux 8
Nec Ews-ux V 4.2
Linux Linux Kernel 2.0
Hp Hp-ux 9
Hp Hp-ux 10
Freebsd Freebsd 2.1.0
Nec Asl Ux 4800
Apple A Ux 3.1.1
Nec Up-ux V 4.2mp
Freebsd Freebsd 2.0
NA
CVE-2000-0005
HP-UX aserver program allows local users to gain privileges via a symlink attack.
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 7.04
Hp Hp-ux 7.06
Hp Hp-ux 8.06
Hp Hp-ux 8.07
Hp Hp-ux 9.05
Hp Hp-ux 9.06
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 10.30
Hp Hp-ux 7.08
Hp Hp-ux 8.00
Hp Hp-ux 8.08
Hp Hp-ux 8.09
Hp Hp-ux 9.07
Hp Hp-ux 9.08
Hp Hp-ux 9.09
Hp Hp-ux 10.00
Hp Hp-ux 10.01
Hp Hp-ux 10.34
Hp Hp-ux 11.00
NA
CVE-2003-1358
rs.F300 for HP-UX 10.0 up to and including 11.22 uses the PATH environment variable to find and execute programs such as rm while operating at raised privileges, which allows local users to gain privileges by modifying the path to point to a malicious rm program.
Hp Hp-ux 10.16
Hp Hp-ux 10.20
Hp Hp-ux 11.04
Hp Hp-ux 11.11
Hp Hp-ux 10.09
Hp Hp-ux 10.10
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Hp Hp-ux 10.00
Hp Hp-ux 10.24
Hp Hp-ux 10.26
Hp Hp-ux 11.20
Hp Hp-ux 11.22
Hp Hp-ux 10.01
Hp Hp-ux 10.08
Hp Hp-ux 10.30
Hp Hp-ux 10.34
1 EDB exploit
NA
CVE-2002-2262
Unspecified vulnerability in xntpd of HP-UX 10.20 up to and including 11.11 allows remote malicious users to cause a denial of service (hang) via unknown attack vectors.
Hp Hp-ux 10.08
Hp Hp-ux 10.09
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 10
Hp Hp-ux 10.03
Hp Hp-ux 10.34
Hp Hp-ux 11
Hp Hp-ux 11.0.4
Hp Hp-ux 10.26
Hp Hp-ux 10.30
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 11.11
Hp Hp-ux 11.11i
NA
CVE-2003-1097
Buffer overflow in rexec on HP-UX B.10.20, B.11.00, and B.11.04, when setuid root, may allow local users to gain privileges via a long -l option.
Hp Hp-ux 10.30
Hp Hp-ux 10.34
Hp Hp-ux 10.20
Hp Hp-ux 10.24
Hp Hp-ux 10.26
Hp Hp-ux 11.22
Hp Hp-ux 11.00
Hp Hp-ux 11.04
Hp Hp-ux 10.10
Hp Hp-ux 10.16
Hp Hp-ux 11.11
Hp Hp-ux 11.20
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »