Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openvms vulnerabilities and exploits
(subscribe to this query)
3.5
CVSSv2
CVE-2015-7851
Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP prior to 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite ...
Ntp Ntp
Ntp Ntp 4.2.8
4.1
CVSSv2
CVE-2013-4035
IBM Sterling Connect:Direct for OpenVMS 3.4.00, 3.4.01, 3.5.00, 3.6.0, and 3.6.0.1 allow remote malicious users to have unspecified impact by leveraging failure to reject client requests for an unencrypted session when used as the server in a TCP/IP session and configured for SSL...
Ibm Sterling Connect 3.5.0.0
Ibm Sterling Connect 3.6.0.1
Ibm Sterling Connect 3.4.0.0
Ibm Sterling Connect 3.4.0.1
Ibm Sterling Connect 3.6.0
4.6
CVSSv2
CVE-2017-17482
An issue exists in OpenVMS through V8.4-2L2 on Alpha and through V8.4-2L1 on IA64, and VAX/VMS 4.0 and later. A malformed DCL command table may result in a buffer overflow allowing a local privilege escalation when a non-privileged account enters a crafted command line. This bug ...
Hp Openvms
5
CVSSv2
CVE-2014-7880
Multiple unspecified vulnerabilities in the POP implementation in HP OpenVMS TCP/IP 5.7 before ECO5 allow remote malicious users to cause a denial of service via unspecified vectors.
Hp Tcp Ip Services Openvms
2.1
CVSSv2
CVE-2012-3276
HP OpenVMS 8.3, 8.3-1H1, and 8.4 on the Itanium platform and 7.3-2, 8.2, 8.3, and 8.4 on the Alpha platform does not properly implement the LOGIN and ACME_SERVER ACMELOGIN programs, which allows local users to cause a denial of service via unspecified vectors.
Hp Openvms 8.3
Hp Openvms 8.4
Hp Openvms 7.3-2
Hp Openvms 8.3-1h1
5
CVSSv2
CVE-2012-3277
HP OpenVMS 8.3, 8.3-1H1, and 8.4 on the Itanium platform and 7.3-2, 8.2, 8.3, and 8.4 on the Alpha platform does not properly implement the LOGIN and ACME_SERVER ACMELOGIN programs, which allows remote malicious users to cause a denial of service via unspecified vectors.
Hp Openvms 8.4
Hp Openvms 8.2
Hp Openvms 8.3
Hp Openvms 8.3-1h1
Hp Openvms 7.3-2
6.9
CVSSv2
CVE-2011-5157
Untrusted search path vulnerability in Attachmate Reflection prior to 14.1 SP1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, a related issue to CVE-2011-0107. NOTE: some of these details are obtained from third party information.
Attachmate Reflection For Ibm 14.0
Attachmate Reflection For Ibm 14.1
Attachmate Reflection X 14.0
Attachmate Reflection X 14.1
Attachmate Reflection For Hp 14.0
Attachmate Reflection For Hp 14.1
Attachmate Reflection For Regis Graphics Server 14.0
Attachmate Reflection For Regis Graphics Server 14.1
Attachmate Reflection For Unix And Openvms 14.0
Attachmate Reflection For Unix And Openvms 14.1
6.9
CVSSv2
CVE-2012-2010
The ACMELOGIN implementation in HP OpenVMS 8.3 and 8.4 on the Alpha platform, and 8.3, 8.3-1H1, and 8.4 on the Itanium platform, when the SYS$ACM system service is enabled, allows local users to gain privileges via unspecified vectors.
Hp Openvms 8.3
Hp Openvms 8.4
Hp Openvms 8.3-1h1
1 Github repository
4.9
CVSSv2
CVE-2012-0134
Unspecified vulnerability in HP OpenVMS 7.3-2 on the Alpha platform, 8.3 and 8.4 on the Alpha and IA64 platforms, and 8.3-1h1 on the IA64 platform allows local users to cause a denial of service via unknown vectors.
Hp Openvms 8.3
Hp Openvms 8.3-1h1
Hp Openvms 8.4
Hp Openvms 7.3-2
1.9
CVSSv2
CVE-2011-1378
IBM WebSphere MQ 6.0 on OpenVMS, when the default rights of the MQM group are established, does not properly verify User Authorization File (UAF) data, which allows local users to kill listener processes and the command server via a control command.
Ibm Websphere Mq 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »