9 results (0.011 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not sufficiently restrict access rights for read-mostly exports, which allows attackers to conduct unauthorized activities. Vulnerabilidad desconocida en rpc.mountd en SGI IRIX 6.5.25, 6.5.26 y 6.5.27 no restringe el derecho de acceso suficientemente para leer la mayoría de las exportaciones, lo que permite a atacantes llevar a cabo actividades no autorizadas. • ftp://patches.sgi.com/support/free/security/advisories/20050601-01-U http://secunia.com/advisories/15619 http://www.ciac.org/ciac/bulletins/p-214.shtml http://www.vupen.com/english/advisories/2005/0702 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not correctly allow access to anonymous clients that connect from a system whose hostname can not be determined. NOTE: while this issue occurs in a security mechanism, there is no apparent attacker role and probably does not satisfy the CVE definition of a vulnerability. rpc.mountd en SGI IRIX 6.5.25, 6.5.26 y 6.5.27 no permiten correctamente el acceso a clientes anónimos que conectan desde un sistema cuyo nombre de host no puede ser determinado. NOTA: mientras que este problema ocurre en un mecanismo de seguridad, no hay un rol de atacante aparente y probablemente no satisface la definición de CVE de una vulnerabilidad. • ftp://patches.sgi.com/support/free/security/advisories/20050601-01-U http://secunia.com/advisories/15619 http://www.ciac.org/ciac/bulletins/p-214.shtml http://www.vupen.com/english/advisories/2005/0702 • CWE-17: DEPRECATED: Code •

CVSS: 2.1EPSS: 0%CPEs: 100EXPL: 2

gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option. • https://www.exploit-db.com/exploits/25362 ftp://patches.sgi.com/support/free/security/advisories/20050402-01-P http://secunia.com/advisories/14875 http://securitytracker.com/id?1013662 http://www.idefense.com/application/poi/display?id=225&type=vulnerabilities •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 through 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors. Vulnerabilidad desconocida en la parte de red del kernel bsd.a de SGI IRIX 6.5.22 a 6.5.25,, y posiblemente versiones anteriores, en los que "t_unbind cambia el comportamiento de t_bind", con impacto y vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20040905-01-P.asc http://secunia.com/advisories/12682 http://www.securityfocus.com/bid/11276 https://exchange.xforce.ibmcloud.com/vulnerabilities/17547 •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 0

The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary." La llamada a la función mapelf32exec en IRIX 6.5.20 6.5.24 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante un "binario corrupto". • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7123 http://www.securityfocus.com/bid/10547 https://exchange.xforce.ibmcloud.com/vulnerabilities/16416 •