Page 3 of 25 results (0.003 seconds)

CVSS: 7.5EPSS: 1%CPEs: 28EXPL: 0

Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled. Vulnerabilidad desconocida en rpc.mountd de SGI IRIX 6.5.18 a 6.5.22 permite a atacantes remotos montar de puertos no privilegiados incluso con la opción -n deshabilitada. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20031102-02-P.asc http://www.securityfocus.com/bid/9085 https://exchange.xforce.ibmcloud.com/vulnerabilities/13807 •

CVSS: 5.0EPSS: 1%CPEs: 32EXPL: 0

Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. Vulnerabilidad desconocida en rpc.mountd de SGI IRX 6.5 a 6.5.22 permite a atacantes remotos causar una denegación de servicio (muerte del proceso) mediante vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20031102-02-P.asc http://www.osvdb.org/8520 http://www.securityfocus.com/bid/9084 https://exchange.xforce.ibmcloud.com/vulnerabilities/13808 •

CVSS: 2.1EPSS: 0%CPEs: 59EXPL: 0

SGI IRIX before 6.5.21 allows local users to cause a denial of service (kernel panic) via a certain call to the PIOCSWATCH ioctl. SGI, IRIX anteriores a la 6.5.21 permiten que usuarios locales provoquen una denegación de servicio (kernel panic) mediante una cierta llamada al ioctl PIOCSWATCH. • ftp://patches.sgi.com/support/free/security/advisories/20030603-01-P http://www.kb.cert.org/vuls/id/142228 http://www.securityfocus.com/bid/7868 http://www.securitytracker.com/id?1008770 https://exchange.xforce.ibmcloud.com/vulnerabilities/12241 •

CVSS: 10.0EPSS: 5%CPEs: 163EXPL: 0

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742 http://marc.info/?l=bugtraq&m=106381604923204&w=2 http://marc.info/?l=bugtraq&m=106382859407683&w=2 http://marc.info/?l=bugtraq&m=106383437615742&w=2 http://marc.info/? •

CVSS: 5.0EPSS: 12%CPEs: 26EXPL: 0

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000727 http://www.kb.cert.org/vuls/id/993452 http://www.mandriva.com/security/advisories?name=MDKSA-2003:086 http://www.novell.com/linux/security/advisories/2003_035_sendmail.html http://www.redhat.com/support/errata/RHSA-2003-265.html http://www.sendmail.org/dnsmap1.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef •