Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Hp:
>> Hp-Ux
>> 10.00
Security Vulnerabilities
CVE-1999-0127
swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-19
CVE-1999-1089
Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-12-13
CVE-1999-0129
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file.
CVSS Score
4.6
EPSS Score
0.001
Published
1996-12-03
CVE-1999-0050
Buffer overflow in HP-UX newgrp program.
CVSS Score
7.2
EPSS Score
0.003
Published
1996-12-01
CVE-1999-0130
Local users can start Sendmail in daemon mode and gain root privileges.
CVSS Score
7.2
EPSS Score
0.009
Published
1996-11-16
CVE-1999-0246
HP Remote Watch allows a remote user to gain root access.
CVSS Score
10.0
EPSS Score
0.007
Published
1996-10-01
CVE-1999-0324
ppl program in HP-UX allows local users to create root files through symlinks.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-09-01
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
CVSS Score
7.8
EPSS Score
0.003
Published
1996-07-03
CVE-1999-1205
nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information.
CVSS Score
2.1
EPSS Score
0.002
Published
1996-06-07
CVE-1999-0078
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
CVSS Score
1.9
EPSS Score
0.001
Published
1996-04-18
Prev
Next
Page 8
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved