HP : Security Vulnerabilities, CVEs, Published In February 2007
Unspecified vulnerability in HP Serviceguard for Linux; packaged for SuSE SLES8 and United Linux 1.0 before SG A.11.15.07, SuSE SLES9 and SLES10 before SG A.11.16.10, and Red Hat Enterprise Linux (RHEL) before SG A.11.16.10; allows remote attackers to obtain unauthorized access via unspecified vectors.
Max CVSS
10.0
EPSS Score
2.10%
Published
2007-02-16
Updated
2011-03-08
Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport functionality in HP-UX B.11.11 and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors.
Max CVSS
4.9
EPSS Score
0.04%
Published
2007-02-14
Updated
2017-10-11
Distributed SLS daemon (SLSd) on HP-UX B.11.11 allows remote attackers to overwrite arbitrary files and gain privileges via a crafted RPC request.
Max CVSS
10.0
EPSS Score
0.62%
Published
2007-02-14
Updated
2017-07-29
Unspecified vulnerability in HP OpenView Storage Data Protector on HP-UX B.11.00, B.11.11, or B.11.23 allows local users to execute arbitrary code via unknown vectors.
Max CVSS
6.8
EPSS Score
0.04%
Published
2007-02-09
Updated
2018-10-16
HP Network Node Manager (NNM) Remote Console 7.50, 7.51, and 7.53 assigns Everyone Full Control permission for the %PROGRAMFILES%\HP OpenView directory tree, which allows local users to gain privileges via a Trojan horse executable file or ActiveX component, or a modified bin\ovtrcsvc.exe for the HP Open View Shared Trace Service.
Max CVSS
7.2
EPSS Score
0.04%
Published
2007-02-08
Updated
2017-07-29
The ps (/usr/ucb/ps) command on HP Tru64 UNIX 5.1 1885 allows local users to obtain sensitive information, including environment variables of arbitrary processes, via the "auxewww" argument, a similar issue to CVE-1999-1587.
Max CVSS
2.1
EPSS Score
0.04%
Published
2007-02-07
Updated
2018-10-16
Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
Max CVSS
10.0
EPSS Score
77.37%
Published
2007-02-08
Updated
2018-10-16
7 vulnerabilities found