Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Max CVSS
10.0
EPSS Score
4.41%
Published
1998-04-01
Updated
2018-10-30
Buffer overflow in NIS+, in Sun's rpc.nisd program.
Max CVSS
10.0
EPSS Score
13.97%
Published
1998-06-08
Updated
2018-10-30
Buffer overflow of rlogin program using TERM environmental variable.
Max CVSS
10.0
EPSS Score
0.94%
Published
1997-02-06
Updated
2024-02-09
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
Max CVSS
10.0
EPSS Score
6.01%
Published
1997-10-29
Updated
2022-08-17
HP Remote Watch allows a remote user to gain root access.
Max CVSS
10.0
EPSS Score
0.86%
Published
1996-10-01
Updated
2022-08-17
rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory.
Max CVSS
9.3
EPSS Score
0.38%
Published
1999-02-10
Updated
2013-09-03
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
Max CVSS
10.0
EPSS Score
0.70%
Published
1999-07-01
Updated
2018-10-30
Vulnerability in ftpd/kftpd in HP-UX 10.x and 9.x allows local and possibly remote users to gain root privileges.
Max CVSS
10.0
EPSS Score
1.17%
Published
1997-02-02
Updated
2016-10-18
Multiple unknown vulnerabilities in the "r-cmnds" (1) remshd, (2) rexecd, (3) rlogind, (4) rlogin, (5) remsh, (6) rcp, (7) rexec, and (8) rdist for HP-UX 10.00 through 11.00 allow attackers to gain privileges or access files.
Max CVSS
10.0
EPSS Score
1.10%
Published
1999-12-28
Updated
2017-10-19
The snmpd.conf configuration file for the SNMP daemon (snmpd) in HP-UX 11.0 is world writable, which allows local users to modify SNMP configuration or gain privileges.
Max CVSS
10.0
EPSS Score
0.99%
Published
2000-06-07
Updated
2017-10-10

CVE-2000-0573

Public exploit
The lreply function in wu-ftpd 2.6.0 and earlier does not properly cleanse an untrusted format string, which allows remote attackers to execute arbitrary commands via the SITE EXEC command.
Max CVSS
10.0
EPSS Score
96.95%
Published
2000-07-07
Updated
2018-05-03
Format string vulnerability in ftpd in HP-UX 10.20 allows remote attackers to cause a denial of service or execute arbitrary commands via format strings in the PASS command.
Max CVSS
10.0
EPSS Score
2.06%
Published
2000-10-20
Updated
2008-09-05
Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service.
Max CVSS
10.0
EPSS Score
0.65%
Published
2001-01-09
Updated
2017-10-19
Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
Max CVSS
10.0
EPSS Score
0.45%
Published
2001-06-18
Updated
2024-02-02
Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
Max CVSS
10.0
EPSS Score
1.09%
Published
2001-06-18
Updated
2024-02-02

CVE-2001-0797

Public exploit
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Max CVSS
10.0
EPSS Score
97.24%
Published
2001-12-12
Updated
2018-10-30
Vulnerability in HP-UX line printer daemon (rlpdaemon) in HP-UX 10.01 through 11.11 allows remote attackers to modify arbitrary files and gain root privileges via a certain print request.
Max CVSS
10.0
EPSS Score
6.56%
Published
2001-12-06
Updated
2017-12-19
Vulnerability in mkacct in HP-UX 11.04 running Virtualvault Operating System (VVOS) 4.0 and 4.5 allows attackers to elevate privileges.
Max CVSS
10.0
EPSS Score
1.36%
Published
2001-07-19
Updated
2017-12-19
Buffer overflow in Common Desktop Environment (CDE) ToolTalk RPC database server (rpc.ttdbserverd) allows remote attackers to execute arbitrary code via an argument to the _TT_CREATE_FILE procedure.
Max CVSS
10.0
EPSS Score
1.72%
Published
2002-09-05
Updated
2018-10-30
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
Max CVSS
10.0
EPSS Score
90.25%
Published
2003-03-07
Updated
2024-02-09
Unknown vulnerability in pam_authz in the LDAP-UX Integration product on HP-UX 11.00 and 11.11 allows remote attackers to execute r-commands with privileges of other users.
Max CVSS
10.0
EPSS Score
1.98%
Published
2002-12-31
Updated
2017-10-11
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Max CVSS
10.0
EPSS Score
17.22%
Published
2003-04-02
Updated
2018-10-30
Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
Max CVSS
10.0
EPSS Score
4.49%
Published
2003-05-05
Updated
2018-10-30

CVE-2003-0201

Public exploit
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
Max CVSS
10.0
EPSS Score
97.04%
Published
2003-05-05
Updated
2018-10-30

CVE-2003-0694

Public exploit
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Max CVSS
10.0
EPSS Score
5.70%
Published
2003-10-06
Updated
2018-10-30
42 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!