Page 11 of 66 results (0.008 seconds)

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 2

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19313 ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420403&w=2 http://www.osvdb.org/993 http://www.securityfocus.com/bid/395 https://exchange.xforce.ibmcloud.com/vulnerabilities/2107 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook). • ftp://patches.sgi.com/support/free/security/advisories/19961201-01-PX http://www.iss.net/security_center/static/7575.php http://www.osvdb.org/8563 http://www.securityfocus.com/bid/463 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 1

fsdump command in IRIX allows local users to obtain root access by modifying sensitive files. • https://www.exploit-db.com/exploits/19280 ftp://patches.sgi.com/support/free/security/advisories/19970301-01-P •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 2

Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. • https://www.exploit-db.com/exploits/19356 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I http://marc.info/?l=bugtraq&m=87602167420095&w=2 http://www.iss.net/security_center/static/7456.php http://www.securityfocus.com/bid/470 •

CVSS: 7.2EPSS: 0%CPEs: 21EXPL: 2

Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. • https://www.exploit-db.com/exploits/19545 https://www.exploit-db.com/exploits/19544 ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX http://www.ciac.org/ciac/bulletins/i-042.shtml http://www.securityfocus.com/bid/707 •