Page 29 of 258 results (0.006 seconds)

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 0

Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 through 6.5.11 allows remote attackers to cause a denial of service by forcing the cache to fill the disk. Vulnerabilidad en la función limitadora de cache en el demonio nsd de IRIX 6.5.4 hasta la 6.5.11 permite que atacantes remotos causen una denegación de servicio forzando que la caché ocupe todo el disco. • ftp://patches.sgi.com/support/free/security/advisories/20020102-01-I ftp://patches.sgi.com/support/free/security/advisories/20020102-02-I ftp://patches.sgi.com/support/free/security/advisories/20020102-03-P http://www.securityfocus.com/bid/3882 https://exchange.xforce.ibmcloud.com/vulnerabilities/7907 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Format string vulnerability in NQS daemon (nqsdaemon) in NQE 3.3.0.16 for CRAY UNICOS and SGI IRIX allows a local user to gain root privileges by using qsub to submit a batch job whose name contains formatting characters. Vulnerabilidad en el formateado de cadenas en el demonio NQS (nqsdaemon) en NQE 3.3.0.16 para CRAY UNICOS permite que un usuario local obtenga privilegios de root usando qsub para enviar un proceso job cuyo nombre contiene caracteres de formatado. • ftp://patches.sgi.com/support/free/security/advisories/20020101-01-I http://marc.info/?l=bugtraq&m=100695627423924&w=2 http://www.osvdb.org/3275 http://www.securityfocus.com/bid/3590 https://exchange.xforce.ibmcloud.com/vulnerabilities/7618 •

CVSS: 10.0EPSS: 97%CPEs: 43EXPL: 9

Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 2

The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR). • https://www.exploit-db.com/exploits/20937 ftp://patches.sgi.com/support/free/security/advisories/20010601-01-A http://archives.neohapsis.com/archives/bugtraq/2001-06/0245.html http://marc.info/?l=bugtraq&m=99290754901708&w=2 http://www.securityfocus.com/bid/2887 https://exchange.xforce.ibmcloud.com/vulnerabilities/6724 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpstat2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7639 •