Hp

Secure Os

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 6.04%
  • Published 04.11.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.

  • EPSS 14.13%
  • Published 28.10.2002 05:00:00
  • Last modified 03.04.2025 01:03:51

dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.

Exploit
  • EPSS 2.84%
  • Published 04.10.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Preboot eXecution Environment (PXE) server allows remote attackers to cause a denial of service (crash) via certain DHCP packets from Voice-Over-IP (VOIP) phones.

  • EPSS 0.09%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race con...

  • EPSS 0.07%
  • Published 31.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in the file system protection subsystem in HP Secure OS Software for Linux 1.0 allows additional user privileges on some files beyond what is specified in the file system protection rules, which allows local users to conduct una...

  • EPSS 4.98%
  • Published 31.12.2001 05:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in Tomcat 3.2.1 running on HP Secure OS for Linux 1.0 allows attackers to access servlet resources. NOTE: due to the vagueness of the vendor advisory, it is not clear whether this issue is already covered by other CVE identifie...