Page 4 of 18 results (0.016 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files. Vulnerabilidad desconocida en la librería libcpr del sistema de Punto de Comprobación/Reinicio (Checkpoint/Restart - cpr) en SGI IRIX 6.5.21f y anteriores permite a usuarios locales truncar o sobreescribir ciertos ficheros. • ftp://patches.sgi.com/support/free/security/advisories/20030802-01-P •

CVSS: 10.0EPSS: 0%CPEs: 32EXPL: 0

Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list. Desbordamiento de búfer basado en el montón en el demonio de servicios de nombre (nsd) en SGI IRIX 6.5.x a 6.5.21f, y posiblemente versiones anteriores, permite a atacantes ganar privilegios de root mediante la lista gid AUTH_UNIX. • ftp://patches.sgi.com/support/free/security/advisories/20030704-01-P http://marc.info/?l=bugtraq&m=105958240709302&w=2 http://secunia.com/advisories/9390 http://www.ciac.org/ciac/bulletins/n-130.shtml http://www.kb.cert.org/vuls/id/682900 http://www.osvdb.org/2337 http://www.securityfocus.com/bid/8304 https://exchange.xforce.ibmcloud.com/vulnerabilities/12763 •

CVSS: 4.6EPSS: 0%CPEs: 48EXPL: 0

Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls. Safe.pm 2.0.7 y anteriores, si se usan con Perl 5.8.0 y anteriores, pueden permitir a atacantes escapar de compartimientos seguros en Safe::reval o Safe::rdo usando una variable @_ redefinida, que no es reestablecida entre llamadas sucesivas. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-007.0.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.1/SCOSA-2004.1.txt ftp://patches.sgi.com/support/free/security/advisories/20030606-01-A http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0061.html http://bugs6.perl.org/rt2/Ticket/Display.html?id=17744 http://marc.info/?l=bugtraq&m=104005919814869&w=2 http://marc.info/?l=bugtraq&m=104033126305252&w=2 http://marc.info/?l=bugtraq&m=10404 •