Known Vulnerabilities for Tru64 by Hp

Listed below are 10 of the newest known vulnerabilities associated with "Tru64" by "Hp".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2008-4414 Unspecified vulnerability in the AdvFS showfile command in HP Tru64 UNIX 5.1B-3 and 5.1B-4 allows local users to gain privile... 7.2 - HIGH 2008-11-07 2017-08-08
CVE-2007-2191 Multiple cross-site scripting (XSS) vulnerabilities in freePBX 2.2.x allow remote attackers to inject arbitrary web script or... 6.8 - MEDIUM 2007-04-24 2017-07-29
CVE-2007-1918 The RFC_SET_REG_SERVER_PROPERTY function in the SAP RFC Library 6.40 and 7.00 before 20070109 implements an option for exclus... 5 - MEDIUM 2007-04-10 2021-09-22
CVE-2007-1917 Buffer overflow in the SYSTEM_CREATE_INSTANCE function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote att... 10 - HIGH 2007-04-10 2021-09-22
CVE-2007-1916 Buffer overflow in the RFC_START_GUI function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to... 10 - HIGH 2007-04-10 2021-09-22
CVE-2007-1915 Buffer overflow in the RFC_START_PROGRAM function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attacker... 7.5 - HIGH 2007-04-10 2021-09-22
CVE-2007-1913 The TRUSTED_SYSTEM_SECURITY function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to verify t... 5 - MEDIUM 2007-04-10 2021-09-22
CVE-2007-1898 formmail.php in Jetbox CMS 2.1 allows remote attackers to send arbitrary e-mails (spam) via modified recipient, _SETTINGS[all... 5.8 - MEDIUM 2007-05-16 2018-10-16
CVE-2007-1043 Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) ... 7.5 - HIGH 2007-02-21 2018-10-16
CVE-2007-0805 The ps (/usr/ucb/ps) command on HP Tru64 UNIX 5.1 1885 allows local users to obtain sensitive information, including environm... 2.1 - LOW 2007-02-07 2018-10-16

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
HpTru645.1_pk6_bl20AllAllAll
Operating
System
HpTru645.1_pk5_bl19AllAllAll
Operating
System
HpTru645.1_pk4_bl18AllAllAll
Operating
System
HpTru645.1_pk3_bl17AllAllAll
Operating
System
HpTru645.1b_pk2_bl22AllAllAll
Operating
System
HpTru645.1b_pk1AllAllAll
Operating
System
HpTru645.1b_p3k_bl24AllAllAll
Operating
System
HpTru645.1b4AllAllAll
Operating
System
HpTru645.1b3AllAllAll
Operating
System
HpTru645.1b2_pk4AllAllAll
Operating
System
HpTru645.1b2AllAllAll
Operating
System
HpTru645.1b2pk4AllAll
Operating
System
HpTru645.1b1_pk4AllAllAll
Operating
System
HpTru645.1b1_pk3AllAllAll
Operating
System
HpTru645.1b1pk4AllAll
Operating
System
HpTru645.1b1pk3AllAll
Operating
System
HpTru645.1b1AllAllAll
Operating
System
HpTru645.1bpk1AllAll
Operating
System
HpTru645.1bAllAllAll
Operating
System
HpTru645.1a_pk6AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report