Page 10 of 61 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

/dev/ipfilter on SGI IRIX 6.5 is installed by /dev/MAKEDEV with insecure default permissions (644), which could allow a local user to cause a denial of service (traffic disruption). /dev/ipfilter en SGI IRIX 6.5 es instalado por /dev/MAKEDEV con permisos inseguros por defecto (664), lo que podría permitir a un usuario local causar una denegación de servicio (disrupción de tráfico) • ftp://patches.sgi.com/support/free/security/advisories/20020408-01-I http://www.iss.net/security_center/static/8960.php http://www.kb.cert.org/vuls/id/770891 http://www.osvdb.org/4695 http://www.securityfocus.com/bid/4648 •

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 0

xkas in Xinet K-AShare 0.011.01 for IRIX allows local users to read arbitrary files via a symlink attack on the VOLICON file, which is copied to the .HSicon file in a shared directory. xkas en Xinet K-AShare 0.011.01 para IRIX permite a usuarios locales la lectura de ficheros de su elección mediante un ataque por enlace simbólico al fichero VOLICON file, que copia el fichero .HSicon en un directorio compartido. • ftp://patches.sgi.com/support/free/security/advisories/20020604-01-I http://marc.info/?l=bugtraq&m=101223525118717&w=2 http://www.iss.net/security_center/static/8002.php http://www.securityfocus.com/bid/3969 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

Unknown vulnerability in Mail for SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, when running with the -R option, allows local and remote attackers to cause a core dump. Vulnerabilidad en Mail para SGI IRIX 6.5 a 6.5.15f, y posiblemente versiones anteriores, permite a usuarios locales y remotos causar un volcado del núcleo (core dump). • ftp://patches.sgi.com/support/free/security/advisories/20020401-01-P http://www.ciac.org/ciac/bulletins/m-067.shtml http://www.iss.net/security_center/static/8835.php http://www.securityfocus.com/bid/4499 •

CVSS: 7.5EPSS: 4%CPEs: 21EXPL: 0

Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 through 6.5.15m allows remote attackers to execute arbitrary code via an SNMP request. Desbordamiento de buffer en el demonio SNMP (snmpd) en SGI IRIX 6.5 a 6.5.15m permite a atacantes remotos ejecutar código arbitrario mediante mediante peticiones SNMP. • ftp://patches.sgi.com/support/free/security/advisories/20020201-01-P http://www.iss.net/security_center/alerts/advise113.php http://www.iss.net/security_center/static/7846.php http://www.securityfocus.com/bid/4421 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

rpcbind in SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via malformed RPC packets with invalid lengths. rpcbind en SGI IRIX 6.5 a 6.5.15f, y posiblemente en versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) mediante paquetes RPC malformados con longitudes inválidas. • ftp://patches.sgi.com/support/free/security/advisories/20020306-01-P •