Page 6 of 187 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

NFS in SGI 6.5.21m and 6.5.21f does not perform access checks in certain configurations when an /etc/exports entry uses wildcards without any hostnames or groups, which could allow attackers to bypass intended restrictions. NFS en SGI 6.5.21m y 6.5.21f no realiza comprobaciones de acceso en ciertas configuraciones cuando una entrada en /etc/exports usa comodines sin nungún nombre de máquina o grupos, lo que podría permitir a atacantes evitar la restricciones pretendidas. • ftp://patches.sgi.com/support/free/security/advisories/20031004-01-P http://secunia.com/advisories/10095 http://www.osvdb.org/2734 http://www.securityfocus.com/bid/8921 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in NFS for SGI IRIX 6.5.21 and earlier may allow an NFS client to bypass read-only restrictions. Vulnerabilidad desconocida en NFS en SGI IRIX 6.5.21 y anteriores puede permitir a un cliente NFS saltarse restricciones de sólo lectura. • ftp://patches.sgi.com/support/free/security/advisories/20030901-01-P •

CVSS: 10.0EPSS: 5%CPEs: 163EXPL: 0

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742 http://marc.info/?l=bugtraq&m=106381604923204&w=2 http://marc.info/?l=bugtraq&m=106382859407683&w=2 http://marc.info/?l=bugtraq&m=106383437615742&w=2 http://marc.info/? •

CVSS: 5.0EPSS: 12%CPEs: 26EXPL: 0

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000727 http://www.kb.cert.org/vuls/id/993452 http://www.mandriva.com/security/advisories?name=MDKSA-2003:086 http://www.novell.com/linux/security/advisories/2003_035_sendmail.html http://www.redhat.com/support/errata/RHSA-2003-265.html http://www.sendmail.org/dnsmap1.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef •

CVSS: 7.2EPSS: 0%CPEs: 21EXPL: 0

Unknown vulnerability in SGI IRIX 6.5.x through 6.5.20, and possibly earlier versions, allows local users to cause a core dump in scheme and possibly gain privileges via certain environment variables, a different vulnerability than CVE-2001-0797 and CVE-1999-0028. Vulnerabilidad desconocida en SGI IRIX de la 6.5.x a la 6.5.20, y posiblemente versiones anteriores, permite a usuarios locales causar un volcado de memoria y posiblemente obtener privilegios mediante ciertas variables de entorno , una vulnerabilidad diferente a CVE-2001-0797 y CVE-1999-0028. • ftp://patches.sgi.com/support/free/security/advisories/20030702-01-P •