36 results (0.005 seconds)

CVSS: 10.0EPSS: 22%CPEs: 45EXPL: 1

Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name. Vulnerabilidad de cadena de formato en la función _msgout en rpc.pcnfsd en AIX de IBM versiones 6.1, 5.3 y anteriores; VIOS de IBM versiones 2.1, 1.5 y anteriores; NFS/ONCplus versión B.11.31_09 y anteriores sobre HP-UX de HP versiones B.11.11, B.11.23 y B.11.31; y IRIX de SGI versión 6.5, permiten a los atacantes remotos ejecutar código arbitrario por medio de una petición RPC que contiene especificadores de cadena de formato en un nombre de directorio no comprobado. • https://www.exploit-db.com/exploits/14407 http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc http://marc.info/?l=bugtraq&m=127428077629933&w=2 http://osvdb.org/64729 http://secunia.com/advisories/39835 http://secunia.com/advisories/39911 http://securitytracker.com/id?1024016 http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html http://www.ibm.com/support/docview.wss?uid=isg1IZ73590 http://www.ibm.com/support/docview.wss?uid=isg1IZ735 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 2.1EPSS: 0%CPEs: 100EXPL: 2

gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option. • https://www.exploit-db.com/exploits/25362 ftp://patches.sgi.com/support/free/security/advisories/20050402-01-P http://secunia.com/advisories/14875 http://securitytracker.com/id?1013662 http://www.idefense.com/application/poi/display?id=225&type=vulnerabilities •

CVSS: 7.2EPSS: 0%CPEs: 103EXPL: 0

The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory. La llamada de sistema syssgi SGI_IOPROVE en IRIX 6.5.20 a 6.5.24 permite a usuarios locales ganar privilegios leyendo y escribiendo en la memoria del kernel. • ftp://patches.sgi.com/support/free/security/advisories/20040601-01-P.asc http://secunia.com/advisories/11872 http://www.osvdb.org/7122 https://exchange.xforce.ibmcloud.com/vulnerabilities/16413 •

CVSS: 7.2EPSS: 0%CPEs: 103EXPL: 0

cpr (libcpr) in SGI IRIX before 6.5.25 allows local users to gain privileges by loading a user provided library while restarting the checkpointed process. cpr (libcpr) en SGI IRIX anteriores a 6.5.25 permite a usuarios locales ganar privilegios cargando una librería suminstrada por el usuario mientras se reinicia el proceso con punto de comprobación. • ftp://patches.sgi.com/support/free/security/advisories/20040507-01-P.asc http://www.securityfocus.com/bid/10418 https://exchange.xforce.ibmcloud.com/vulnerabilities/16259 •

CVSS: 5.0EPSS: 12%CPEs: 26EXPL: 0

The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data. • ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000727 http://www.kb.cert.org/vuls/id/993452 http://www.mandriva.com/security/advisories?name=MDKSA-2003:086 http://www.novell.com/linux/security/advisories/2003_035_sendmail.html http://www.redhat.com/support/errata/RHSA-2003-265.html http://www.sendmail.org/dnsmap1.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef •