CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
02h00 +00:00 |
eEye Audit ID 2499 in eEye Digital Security Audits 2406 through 2423 for eEye Retina Network Security Scanner on HP-UX, IRIX, and Solaris allows local users to gain privileges via a Trojan horse gauntlet program in an arbitrary directory under /usr/local/. | 6.9 |
||
18h00 +00:00 |
Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port. | 6.8 |
||
17h00 +00:00 |
Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large "indx truck size" and nEntriesInuse values, and a certain wLongsPerEntry value. | 7.6 |
||
02h00 +00:00 |
rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not correctly allow access to anonymous clients that connect from a system whose hostname can not be determined. NOTE: while this issue occurs in a security mechanism, there is no apparent attacker role and probably does not satisfy the CVE definition of a vulnerability. | 7.5 |
||
02h00 +00:00 |
Unknown vulnerability in rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not sufficiently restrict access rights for read-mostly exports, which allows attackers to conduct unauthorized activities. | 7.5 |
||
04h00 +00:00 |
The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID. | 2.1 |
||
04h00 +00:00 |
The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system. | 5 |
||
04h00 +00:00 |
root privileges via buffer overflow in xlock command on SGI IRIX systems. | 7.2 |
||
04h00 +00:00 |
Command execution in Sun systems via buffer overflow in the at program. | 7.2 |
||
04h00 +00:00 |
Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. | 5 |
||
04h00 +00:00 |
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. | 10 |
||
04h00 +00:00 |
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | 10 |
||
02h00 +00:00 |
root privileges via buffer overflow in df command on SGI IRIX systems. | 7.2 |
||
02h00 +00:00 |
root privileges via buffer overflow in pset command on SGI IRIX systems. | 4.6 |
||
02h00 +00:00 |
root privileges via buffer overflow in eject command on SGI IRIX systems. | 7.2 |
||
02h00 +00:00 |
root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | 7.2 |
||
02h00 +00:00 |
root privileges via buffer overflow in ordist command on SGI IRIX systems. | 8.4 |
High |
|
02h00 +00:00 |
Race condition in signal handling routine in ftpd, allowing read/write arbitrary files. | 5.1 |
||
02h00 +00:00 |
getcwd() file descriptor leak in FTP. | 5 |
||
02h00 +00:00 |
The printers program in IRIX has a buffer overflow that gives root access to local users. | 7.2 |
||
02h00 +00:00 |
Bash treats any character with a value of 255 as a command separator. | 4.6 |