Page 3 of 187 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 65EXPL: 0

05 May 2004 — Unknown vulnerability in SGI IRIX 6.5 through 6.5.22m allows remote attackers to cause a denial of service via a certain UDP packet. • ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

02 Apr 2004 — Unknown vulnerability in ftpd in SGI IRIX 6.5.20 through 6.5.23 allows remote attackers to cause a denial of service (hang) via the PORT mode. • ftp://patches.sgi.com/support/free/security/advisories/20040401-01-P.asc •

CVSS: 9.8EPSS: 0%CPEs: 28EXPL: 0

10 Mar 2004 — Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled. Vulnerabilidad desconocida en rpc.mountd de SGI IRIX 6.5.18 a 6.5.22 permite a atacantes remotos montar de puertos no privilegiados incluso con la opción -n deshabilitada. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc •

CVSS: 7.5EPSS: 0%CPEs: 32EXPL: 0

10 Mar 2004 — Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. Vulnerabilidad desconocida en rpc.mountd de SGI IRX 6.5 a 6.5.22 permite a atacantes remotos causar una denegación de servicio (muerte del proceso) mediante vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc •

CVSS: 5.5EPSS: 0%CPEs: 59EXPL: 0

14 Jan 2004 — SGI IRIX before 6.5.21 allows local users to cause a denial of service (kernel panic) via a certain call to the PIOCSWATCH ioctl. SGI, IRIX anteriores a la 6.5.21 permiten que usuarios locales provoquen una denegación de servicio (kernel panic) mediante una cierta llamada al ioctl PIOCSWATCH. • ftp://patches.sgi.com/support/free/security/advisories/20030603-01-P •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

30 Oct 2003 — NFS in SGI 6.5.21m and 6.5.21f does not perform access checks in certain configurations when an /etc/exports entry uses wildcards without any hostnames or groups, which could allow attackers to bypass intended restrictions. NFS en SGI 6.5.21m y 6.5.21f no realiza comprobaciones de acceso en ciertas configuraciones cuando una entrada en /etc/exports usa comodines sin nungún nombre de máquina o grupos, lo que podría permitir a atacantes evitar la restricciones pretendidas. • ftp://patches.sgi.com/support/free/security/advisories/20031004-01-P •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

18 Sep 2003 — Unknown vulnerability in NFS for SGI IRIX 6.5.21 and earlier may allow an NFS client to bypass read-only restrictions. Vulnerabilidad desconocida en NFS en SGI IRIX 6.5.21 y anteriores puede permitir a un cliente NFS saltarse restricciones de sólo lectura. • ftp://patches.sgi.com/support/free/security/advisories/20030901-01-P •

CVSS: 10.0EPSS: 75%CPEs: 163EXPL: 1

18 Sep 2003 — The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • https://packetstorm.news/files/id/180502 •

CVSS: 7.5EPSS: 1%CPEs: 26EXPL: 0

03 Sep 2003 — The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P •

CVSS: 7.5EPSS: 0%CPEs: 26EXPL: 0

18 Aug 2003 — The Name Service Daemon (nsd), when running on an NIS master on SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via a UDP port scan. El Demonio deL Servicio de Nombres (nsd), cuando se ejecuta en un NIS maestro en SGI IRIX 6.5.x a 6.5.20f, y posiblemente versiones anteriores, permite a atacantes remotos causar una denegación de servicio (caída) mediante un escaneo de puertos UDP. • ftp://patches.sgi.com/support/free/security/advisories/20030701-01-P •