Vulnerabilities (CVE)

Filtered by vendor Hp Subscribe
Filtered by product Secure Os
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2002-1232 3 Debian, Hp, Redhat 3 Debian Linux, Secure Os, Linux 2024-11-20 5.0 MEDIUM N/A
Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
CVE-2002-0836 3 Hp, Mandrakesoft, Redhat 3 Secure Os, Mandrake Linux, Linux 2024-11-20 7.5 HIGH N/A
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
CVE-2002-0835 3 Caldera, Hp, Redhat 4 Openlinux Server, Openlinux Workstation, Secure Os and 1 more 2024-11-20 5.0 MEDIUM N/A
Preboot eXecution Environment (PXE) server allows remote attackers to cause a denial of service (crash) via certain DHCP packets from Voice-Over-IP (VOIP) phones.
CVE-2002-0638 3 Hp, Mandrakesoft, Redhat 5 Secure Os, Mandrake Linux, Mandrake Linux Corporate Server and 2 more 2024-11-20 6.2 MEDIUM N/A
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh.
CVE-2001-1563 2 Apache, Hp 2 Tomcat, Secure Os 2024-11-20 7.5 HIGH N/A
Unknown vulnerability in Tomcat 3.2.1 running on HP Secure OS for Linux 1.0 allows attackers to access servlet resources. NOTE: due to the vagueness of the vendor advisory, it is not clear whether this issue is already covered by other CVE identifiers.
CVE-2001-1506 1 Hp 1 Secure Os 2024-11-20 4.6 MEDIUM N/A
Unknown vulnerability in the file system protection subsystem in HP Secure OS Software for Linux 1.0 allows additional user privileges on some files beyond what is specified in the file system protection rules, which allows local users to conduct unauthorized operations on restricted files.