Page 3 of 18 results (0.004 seconds)

CVSS: 5.0EPSS: 1%CPEs: 32EXPL: 0

Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. Vulnerabilidad desconocida en rpc.mountd de SGI IRX 6.5 a 6.5.22 permite a atacantes remotos causar una denegación de servicio (muerte del proceso) mediante vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20031102-02-P.asc http://www.osvdb.org/8520 http://www.securityfocus.com/bid/9084 https://exchange.xforce.ibmcloud.com/vulnerabilities/13808 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

NFS in SGI 6.5.21m and 6.5.21f does not perform access checks in certain configurations when an /etc/exports entry uses wildcards without any hostnames or groups, which could allow attackers to bypass intended restrictions. NFS en SGI 6.5.21m y 6.5.21f no realiza comprobaciones de acceso en ciertas configuraciones cuando una entrada en /etc/exports usa comodines sin nungún nombre de máquina o grupos, lo que podría permitir a atacantes evitar la restricciones pretendidas. • ftp://patches.sgi.com/support/free/security/advisories/20031004-01-P http://secunia.com/advisories/10095 http://www.osvdb.org/2734 http://www.securityfocus.com/bid/8921 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in NFS for SGI IRIX 6.5.21 and earlier may allow an NFS client to bypass read-only restrictions. Vulnerabilidad desconocida en NFS en SGI IRIX 6.5.21 y anteriores puede permitir a un cliente NFS saltarse restricciones de sólo lectura. • ftp://patches.sgi.com/support/free/security/advisories/20030901-01-P •

CVSS: 10.0EPSS: 5%CPEs: 163EXPL: 0

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742 http://marc.info/?l=bugtraq&m=106381604923204&w=2 http://marc.info/?l=bugtraq&m=106382859407683&w=2 http://marc.info/?l=bugtraq&m=106383437615742&w=2 http://marc.info/? •

CVSS: 5.0EPSS: 12%CPEs: 26EXPL: 0

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000727 http://www.kb.cert.org/vuls/id/993452 http://www.mandriva.com/security/advisories?name=MDKSA-2003:086 http://www.novell.com/linux/security/advisories/2003_035_sendmail.html http://www.redhat.com/support/errata/RHSA-2003-265.html http://www.sendmail.org/dnsmap1.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef •