Vulnerabilities > HP > HP UX
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2000-12-11 | CVE-2000-1028 | Buffer Overflow vulnerability in HP HP-UX cu Buffer overflow in cu program in HP-UX 11.0 may allow local users to gain privileges via a long -l command line argument. | 7.2 |
2000-10-20 | CVE-2000-0801 | Buffer Overflow vulnerability in HP Hp-Ux 10.20/11.00 Buffer overflow in bdf program in HP-UX 11.00 may allow local users to gain root privileges via a long -t option. | 7.2 |
2000-10-20 | CVE-2000-0730 | Unspecified vulnerability in HP Hp-Ux 11.00 Vulnerability in newgrp command in HP-UX 11.0 allows local users to gain privileges. | 4.6 |
2000-10-20 | CVE-2000-0702 | Unspecified vulnerability in HP Hp-Ux 11.00 The net.init rc script in HP-UX 11.00 (S008net.init) allows local users to overwrite arbitrary files via a symlink attack that points from /tmp/stcp.conf to the targeted file. | 7.2 |
2000-10-20 | CVE-2000-0699 | Unspecified vulnerability in HP Hp-Ux 10.20/11.00 Format string vulnerability in ftpd in HP-UX 10.20 allows remote attackers to cause a denial of service or execute arbitrary commands via format strings in the PASS command. | 10.0 |
2000-05-04 | CVE-2000-0414 | Unspecified vulnerability in HP Hp-Ux and Vvos Vulnerability in shutdown command for HP-UX 11.X and 10.X allows allows local users to gain privileges via malformed input variables. | 4.6 |
2000-04-18 | CVE-2000-0083 | Unspecified vulnerability in HP Hp-Ux 10/11 HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain additional privileges. | 4.6 |
2000-04-06 | CVE-2000-0251 | Unspecified vulnerability in HP Hp-Ux and Vvos HP-UX 11.04 VirtualVault (VVOS) sends data to unprivileged processes via an interface that has multiple aliased IP addresses. | 5.0 |
2000-03-02 | CVE-1999-0693 | Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. | 7.2 |
2000-01-24 | CVE-2000-0095 | Unspecified vulnerability in HP Hp-Ux 10.30/11.00 The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier. | 5.0 |