Page 3 of 15 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 65EXPL: 0

Unknown vulnerability in SGI IRIX 6.5 through 6.5.22m allows remote attackers to cause a denial of service via a certain UDP packet. • ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc http://www.securityfocus.com/bid/10287 https://exchange.xforce.ibmcloud.com/vulnerabilities/16158 •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Unknown vulnerability in ftpd in SGI IRIX 6.5.20 through 6.5.23 allows remote attackers to cause a denial of service (hang) via the PORT mode. • ftp://patches.sgi.com/support/free/security/advisories/20040401-01-P.asc http://www.securityfocus.com/bid/10037 https://exchange.xforce.ibmcloud.com/vulnerabilities/15723 •

CVSS: 7.5EPSS: 1%CPEs: 28EXPL: 0

Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled. Vulnerabilidad desconocida en rpc.mountd de SGI IRIX 6.5.18 a 6.5.22 permite a atacantes remotos montar de puertos no privilegiados incluso con la opción -n deshabilitada. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20031102-02-P.asc http://www.securityfocus.com/bid/9085 https://exchange.xforce.ibmcloud.com/vulnerabilities/13807 •

CVSS: 5.0EPSS: 1%CPEs: 32EXPL: 0

Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. Vulnerabilidad desconocida en rpc.mountd de SGI IRX 6.5 a 6.5.22 permite a atacantes remotos causar una denegación de servicio (muerte del proceso) mediante vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20031102-01-P.asc ftp://patches.sgi.com/support/free/security/advisories/20031102-02-P.asc http://www.osvdb.org/8520 http://www.securityfocus.com/bid/9084 https://exchange.xforce.ibmcloud.com/vulnerabilities/13808 •

CVSS: 4.6EPSS: 0%CPEs: 48EXPL: 0

Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls. Safe.pm 2.0.7 y anteriores, si se usan con Perl 5.8.0 y anteriores, pueden permitir a atacantes escapar de compartimientos seguros en Safe::reval o Safe::rdo usando una variable @_ redefinida, que no es reestablecida entre llamadas sucesivas. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744 http://marc.info/?l=bugtraq&m=104005919814869&w=2 http://marc.info/?l=bugtraq&m=104033126305252&w=2 http://marc.info/?l=bugtraq&m=10404 •