Page 19 of 258 results (0.006 seconds)

CVSS: 5.0EPSS: 12%CPEs: 26EXPL: 0

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000727 http://www.kb.cert.org/vuls/id/993452 http://www.mandriva.com/security/advisories?name=MDKSA-2003:086 http://www.novell.com/linux/security/advisories/2003_035_sendmail.html http://www.redhat.com/support/errata/RHSA-2003-265.html http://www.sendmail.org/dnsmap1.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef •

CVSS: 7.2EPSS: 0%CPEs: 21EXPL: 0

Unknown vulnerability in SGI IRIX 6.5.x through 6.5.20, and possibly earlier versions, allows local users to cause a core dump in scheme and possibly gain privileges via certain environment variables, a different vulnerability than CVE-2001-0797 and CVE-1999-0028. Vulnerabilidad desconocida en SGI IRIX de la 6.5.x a la 6.5.20, y posiblemente versiones anteriores, permite a usuarios locales causar un volcado de memoria y posiblemente obtener privilegios mediante ciertas variables de entorno , una vulnerabilidad diferente a CVE-2001-0797 y CVE-1999-0028. • ftp://patches.sgi.com/support/free/security/advisories/20030702-01-P •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files. Vulnerabilidad desconocida en la librería libcpr del sistema de Punto de Comprobación/Reinicio (Checkpoint/Restart - cpr) en SGI IRIX 6.5.21f y anteriores permite a usuarios locales truncar o sobreescribir ciertos ficheros. • ftp://patches.sgi.com/support/free/security/advisories/20030802-01-P •

CVSS: 5.0EPSS: 0%CPEs: 23EXPL: 0

Unknown vulnerability in the NFS daemon (nfsd) in SGI IRIX 6.5.19f and earlier allows remote attackers to cause a denial of service (kernel panic) via certain packets that cause XDR decoding errors, a different vulnerability than CVE-2003-0619. Vulnerabilidad desconocida en el demonio NFS (nfsd) en SGI IRIX 6.5.19f y anteriores permite a atacantes remotos causar una denegación de servicio (pánico del kernel) mediante ciertos paquetes que causan errores de decodificación XDR, una vulnerabilidad diferente de CAN-2003-0619. • ftp://patches.sgi.com/support/free/security/advisories/20030801-01-P ftp://patches.sgi.com/support/free/security/advisories/20030801-02-P •

CVSS: 10.0EPSS: 0%CPEs: 32EXPL: 0

Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list. Desbordamiento de búfer basado en el montón en el demonio de servicios de nombre (nsd) en SGI IRIX 6.5.x a 6.5.21f, y posiblemente versiones anteriores, permite a atacantes ganar privilegios de root mediante la lista gid AUTH_UNIX. • ftp://patches.sgi.com/support/free/security/advisories/20030704-01-P http://marc.info/?l=bugtraq&m=105958240709302&w=2 http://secunia.com/advisories/9390 http://www.ciac.org/ciac/bulletins/n-130.shtml http://www.kb.cert.org/vuls/id/682900 http://www.osvdb.org/2337 http://www.securityfocus.com/bid/8304 https://exchange.xforce.ibmcloud.com/vulnerabilities/12763 •