Page 11 of 66 results (0.008 seconds)

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. • ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX http://ciac.llnl.gov/ciac/bulletins/h-65.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2109 •

CVSS: 8.4EPSS: 0%CPEs: 8EXPL: 2

IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. • https://www.exploit-db.com/exploits/336 https://www.exploit-db.com/exploits/19310 ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX http://www.ciac.org/ciac/bulletins/h-106.shtml http://www.osvdb.org/990 https://exchange.xforce.ibmcloud.com/vulnerabilities/557 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.2EPSS: 0%CPEs: 14EXPL: 2

Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. • https://www.exploit-db.com/exploits/19358 http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.insecure.org/sploits/irix.xfsdump.html http://www.securityfocus.com/bid/472 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities. • http://marc.info/?l=bugtraq&m=87602167420919&w=2 •