Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Hp:
Security Vulnerabilities
CVE-1999-1145
Vulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges.
CVSS Score
7.2
EPSS Score
0.001
Published
1997-01-07
CVE-1999-1311
Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.
CVSS Score
4.6
EPSS Score
0.001
Published
1997-01-07
CVE-1999-1249
movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges.
CVSS Score
4.6
EPSS Score
0.001
Published
1997-01-06
CVE-1999-0517
An SNMP community name is the default (e.g. public), null, or missing.
CVSS Score
7.5
EPSS Score
0.923
Published
1997-01-01
CVE-1999-1251
Vulnerability in direct audio user space code on HP-UX 10.20 and 10.10 allows local users to cause a denial of service.
CVSS Score
2.1
EPSS Score
0.001
Published
1996-12-24
CVE-1999-0127
swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-19
CVE-1999-1089
Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-13
CVE-1999-0129
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
CVSS Score
4.6
EPSS Score
0.001
Published
1996-12-03
CVE-1999-0050
Buffer overflow in HP-UX newgrp program.
CVSS Score
7.2
EPSS Score
0.009
Published
1996-12-01
CVE-1999-0130
Local users can start Sendmail in daemon mode and gain root privileges.
CVSS Score
7.2
EPSS Score
0.009
Published
1996-11-16
Prev
Next
Page 244
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved