Page 11 of 146 results (0.004 seconds)

CVSS: 2.1EPSS: 0%CPEs: 21EXPL: 0

Vulnerability in SGI IRIX 6.5.11 through 6.5.15f allows local users to cause privileged applications to dump core via the HOSTALIASES environment variable, which might allow the users to gain privileges. Vulnerabilidad en SGI IRIX 6.5.11 a 6.5.15f permite a usuarios locales producir volcados de núcleo (dump core) a aplicaciones con privilegios mediane la variable de entorno HOSTALIASES, que podría permitir a los usuarios ganar privilegios. • ftp://patches.sgi.com/support/free/security/advisories/20020306-01-P http://www.iss.net/security_center/static/8669.php http://www.osvdb.org/2058 http://www.securityfocus.com/bid/4388 •

CVSS: 5.0EPSS: 0%CPEs: 21EXPL: 0

rpcbind in SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via malformed RPC packets with invalid lengths. rpcbind en SGI IRIX 6.5 a 6.5.15f, y posiblemente en versiones anteriores, permite a atacantes remotos provocar una denegación de servicio (caída) mediante paquetes RPC malformados con longitudes inválidas. • ftp://patches.sgi.com/support/free/security/advisories/20020306-01-P •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 through 6.5.11 allows remote attackers to cause a denial of service by forcing the cache to fill the disk. Vulnerabilidad en la función limitadora de cache en el demonio nsd de IRIX 6.5.4 hasta la 6.5.11 permite que atacantes remotos causen una denegación de servicio forzando que la caché ocupe todo el disco. • ftp://patches.sgi.com/support/free/security/advisories/20020102-01-I ftp://patches.sgi.com/support/free/security/advisories/20020102-02-I ftp://patches.sgi.com/support/free/security/advisories/20020102-03-P http://www.securityfocus.com/bid/3882 https://exchange.xforce.ibmcloud.com/vulnerabilities/7907 •

CVSS: 10.0EPSS: 97%CPEs: 43EXPL: 9

Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpstat2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7639 •