Page 10 of 66 results (0.016 seconds)

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

/dev/ipfilter on SGI IRIX 6.5 is installed by /dev/MAKEDEV with insecure default permissions (644), which could allow a local user to cause a denial of service (traffic disruption). /dev/ipfilter en SGI IRIX 6.5 es instalado por /dev/MAKEDEV con permisos inseguros por defecto (664), lo que podría permitir a un usuario local causar una denegación de servicio (disrupción de tráfico) • ftp://patches.sgi.com/support/free/security/advisories/20020408-01-I http://www.iss.net/security_center/static/8960.php http://www.kb.cert.org/vuls/id/770891 http://www.osvdb.org/4695 http://www.securityfocus.com/bid/4648 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

Unknown vulnerability in Mail for SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, when running with the -R option, allows local and remote attackers to cause a core dump. Vulnerabilidad en Mail para SGI IRIX 6.5 a 6.5.15f, y posiblemente versiones anteriores, permite a usuarios locales y remotos causar un volcado del núcleo (core dump). • ftp://patches.sgi.com/support/free/security/advisories/20020401-01-P http://www.ciac.org/ciac/bulletins/m-067.shtml http://www.iss.net/security_center/static/8835.php http://www.securityfocus.com/bid/4499 •

CVSS: 7.5EPSS: 4%CPEs: 21EXPL: 0

Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 through 6.5.15m allows remote attackers to execute arbitrary code via an SNMP request. Desbordamiento de buffer en el demonio SNMP (snmpd) en SGI IRIX 6.5 a 6.5.15m permite a atacantes remotos ejecutar código arbitrario mediante mediante peticiones SNMP. • ftp://patches.sgi.com/support/free/security/advisories/20020201-01-P http://www.iss.net/security_center/alerts/advise113.php http://www.iss.net/security_center/static/7846.php http://www.securityfocus.com/bid/4421 •

CVSS: 2.1EPSS: 0%CPEs: 21EXPL: 0

Vulnerability in SGI IRIX 6.5.11 through 6.5.15f allows local users to cause privileged applications to dump core via the HOSTALIASES environment variable, which might allow the users to gain privileges. Vulnerabilidad en SGI IRIX 6.5.11 a 6.5.15f permite a usuarios locales producir volcados de núcleo (dump core) a aplicaciones con privilegios mediane la variable de entorno HOSTALIASES, que podría permitir a los usuarios ganar privilegios. • ftp://patches.sgi.com/support/free/security/advisories/20020306-01-P http://www.iss.net/security_center/static/8669.php http://www.osvdb.org/2058 http://www.securityfocus.com/bid/4388 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

rpcbind in SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via malformed RPC packets with invalid lengths. rpcbind en SGI IRIX 6.5 a 6.5.15f, y posiblemente en versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) mediante paquetes RPC malformados con longitudes inválidas. • ftp://patches.sgi.com/support/free/security/advisories/20020306-01-P •