Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
compaq tru64 5.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0816
Buffer overflow in su in Tru64 Unix 5.x allows local users to gain root privileges via a long username and argument.
Compaq Tru64 4.0f
Compaq Tru64 4.0g
Compaq Tru64 5.0
Compaq Tru64 5.1a
Compaq Tru64 5.0a
Compaq Tru64 5.1
NA
CVE-2002-2002
Buffer overflow in libc in Compaq Tru64 4.0F, 5.0, 5.1 and 5.1A allows malicious users to execute arbitrary code via long (1) LANG and (2) LOCPATH environment variables.
Compaq Tru64 4.0f
Compaq Tru64 5.0
Compaq Tru64 5.1
Compaq Tru64 5.1a
NA
CVE-2001-1033
Compaq TruCluster 1.5 allows remote malicious users to cause a denial of service via a port scan from a system that does not have a DNS PTR record, which causes the cluster to enter a "split-brain" state.
Compaq Trucluster 1.5
Compaq Tru64 5.0
Compaq Tru64 5.1
NA
CVE-2002-1129
Buffer overflow in dxterm allows local users to execute arbitrary code via a long -xrm argument.
Compaq Tru64 5.0
Compaq Tru64 5.0 Pk4 Bl17
Compaq Tru64 5.1 Pk5 Bl19
Compaq Tru64 5.1a
Compaq Tru64 5.1a Pk1 Bl1
Digital Osf 1 3.2d
Digital Osf 1 3.2de1
Compaq Tru64 4.0f Pk6 Bl17
Compaq Tru64 4.0f Pk7 Bl18
Compaq Tru64 5.0a Pk3 Bl17
Compaq Tru64 5.1
Digital Osf 1 3.0b
Digital Osf 1 3.2
Digital Osf 1 3.2g
Compaq Tru64 4.0f
Compaq Tru64 5.0 Pk4 Bl18
Compaq Tru64 5.0a
Compaq Tru64 5.1a Pk2 Bl2
Digital Osf 1 3.0
Digital Osf 1 3.2de2
Digital Osf 1 3.2f
Compaq Tru64 4.0g
1 EDB exploit
NA
CVE-2003-0914
ISC BIND 8.3.x prior to 8.3.7, and 8.4.x prior to 8.4.3, allows remote malicious users to poison the cache via a malicious name server that returns negative responses with a large TTL (time-to-live) value.
Isc Bind 8.2.3
Isc Bind 8.3.2
Isc Bind 8.3.3
Nixu Namesurfer Suite 3.0.1
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 8.3.4
Isc Bind 8.3.5
Isc Bind 8.3.0
Isc Bind 8.3.1
Isc Bind 8.4.1
Nixu Namesurfer Standard 3.0.1
Isc Bind 8.2.6
Isc Bind 8.2.7
Isc Bind 8.3.6
Isc Bind 8.4
Compaq Tru64 5.1
Compaq Tru64 5.1 Pk3 Bl17
Compaq Tru64 5.1a Pk3 Bl3
Compaq Tru64 5.1a Pk4 Bl21
Freebsd Freebsd 4.6
Freebsd Freebsd 4.6.2
NA
CVE-2003-0196
Multiple buffer overflows in Samba prior to 2.2.8a may allow remote malicious users to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
Samba-tng Samba-tng 0.3
Samba-tng Samba-tng 0.3.1
Samba Samba 2.0.5
Samba Samba 2.0.6
Samba Samba 2.2.3
Samba Samba 2.2.3a
Samba Samba 2.0.0
Samba Samba 2.0.1
Samba Samba 2.0.7
Samba Samba 2.0.8
Samba Samba 2.0.9
Samba Samba 2.2.4
Samba Samba 2.2.5
Samba Samba 2.0.10
Samba Samba 2.0.2
Samba Samba 2.2.0
Samba Samba 2.2.0a
Samba Samba 2.2.6
Samba Samba 2.2.7
Samba Samba 2.0.3
Samba Samba 2.0.4
Samba Samba 2.2.1a
NA
CVE-2003-0201
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x prior to 2.2.8a, 2.0.10 and previous versions 2.0.x versions, and Samba-TNG prior to 0.3.2, allows remote malicious users to execute arbitrary code.
Samba Samba 2.0.3
Samba Samba 2.0.4
Samba Samba 2.2.1a
Samba Samba 2.2.3a
Samba Samba 2.0.10
Samba Samba 2.0.2
Samba Samba 2.2.0
Samba Samba 2.2.0a
Samba Samba 2.2.7a
Samba Samba 2.2.8
Samba-tng Samba-tng 0.3
Samba-tng Samba-tng 0.3.1
Samba Samba 2.0.5
Samba Samba 2.0.6
Samba Samba 2.0.7
Samba Samba 2.2.4
Samba Samba 2.2.5
Samba Samba 2.0.0
Samba Samba 2.0.1
Samba Samba 2.0.8
Samba Samba 2.0.9
Samba Samba 2.2.6
12 EDB exploits
3 Github repositories
NA
CVE-2003-0161
The prescan() function in the address parser (parseaddr.c) in Sendmail prior to 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" co...
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.0
Sendmail Sendmail 8.12.7
Sendmail Sendmail 8.12.8
Sendmail Sendmail 8.9.1
Sendmail Sendmail 8.9.2
Sendmail Sendmail Switch 2.2
Sendmail Sendmail Switch 2.2.1
Sendmail Sendmail Switch 3.0.2
Sendmail Sendmail Switch 3.0.3
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12
Sendmail Sendmail Switch 2.1.1
2 EDB exploits
1 Github repository
NA
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
NA
CVE-2003-0688
The DNS map code in Sendmail 8.12.8 and previous versions, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote malicious users to cause a denial of service (process crash) via an invalid DNS response that causes S...
Redhat Sendmail 8.12.8-4
Sendmail Sendmail 8.12.1
Sendmail Sendmail 8.12.8
Sgi Irix 6.5.19
Redhat Sendmail 8.12.5-7
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sgi Irix 6.5.20
Sgi Irix 6.5.21
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.7
Freebsd Freebsd 4.7
Freebsd Freebsd 4.8
Compaq Tru64 5.0a
Freebsd Freebsd 5.0
Openbsd Openbsd 3.2
Compaq Tru64 5.1
Freebsd Freebsd 4.6
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started