Page 4 of 187 results (0.006 seconds)

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 0

The mapelf32exec function call in IRIX 6.5.20 through 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary." La llamada a la función mapelf32exec en IRIX 6.5.20 6.5.24 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante un "binario corrupto". • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7123 http://www.securityfocus.com/bid/10547 https://exchange.xforce.ibmcloud.com/vulnerabilities/16416 •

CVSS: 7.2EPSS: 0%CPEs: 103EXPL: 0

The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory. La llamada de sistema syssgi SGI_IOPROVE en IRIX 6.5.20 a 6.5.24 permite a usuarios locales ganar privilegios leyendo y escribiendo en la memoria del kernel. • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7122 https://exchange.xforce.ibmcloud.com/vulnerabilities/16413 •

CVSS: 7.2EPSS: 0%CPEs: 103EXPL: 0

cpr (libcpr) in SGI IRIX before 6.5.25 allows local users to gain privileges by loading a user provided library while restarting the checkpointed process. cpr (libcpr) en SGI IRIX anteriores a 6.5.25 permite a usuarios locales ganar privilegios cargando una librería suminstrada por el usuario mientras se reinicia el proceso con punto de comprobación. • ftp://patches.sgi.com/support/free/security/advisories/20040507-01-P.asc http://www.securityfocus.com/bid/10418 https://exchange.xforce.ibmcloud.com/vulnerabilities/16259 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Unknown vulnerability in rpc.mountd for SGI IRIX 6.5.24 allows remote attackers to cause a denial of service (infinite loop) via certain RPC requests. Vulnerabilidad desconocida en rpc.mountd de SGI IRIX 6.5.24 permite a atacantes remotos causar una denegación de servicio (bucle infinito) mediante ciertas peticiones RPC. • ftp://patches.sgi.com/support/free/security/advisories/20040503-01-P http://secunia.com/advisories/11628 http://securitytracker.com/id?1010185 http://www.osvdb.org/6201 http://www.securityfocus.com/bid/10372 https://exchange.xforce.ibmcloud.com/vulnerabilities/16175 •

CVSS: 4.6EPSS: 0%CPEs: 28EXPL: 0

ifconfig "-arp" in SGI IRIX 6.5 through 6.5.22m does not properly disable ARP requests from being sent or received. • ftp://patches.sgi.com/support/free/security/advisories/20040502-01-P.asc http://www.securityfocus.com/bid/10289 •