Page 13 of 85 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 1

webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. • https://www.exploit-db.com/exploits/19299 ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX http://www.cert.org/advisories/CA-1997-12.html http://www.osvdb.org/235 http://www.securityfocus.com/bid/374 https://exchange.xforce.ibmcloud.com/vulnerabilities/333 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 43EXPL: 5

Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. • https://www.exploit-db.com/exploits/331 https://www.exploit-db.com/exploits/322 https://www.exploit-db.com/exploits/19200 https://www.exploit-db.com/exploits/19201 https://www.exploit-db.com/exploits/19202 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040 •

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 1

The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack. • https://www.exploit-db.com/exploits/19298 ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX http://www.osvdb.org/247 http://www.securityfocus.com/bid/373 https://exchange.xforce.ibmcloud.com/vulnerabilities/290 •