Page 13 of 96 results (0.005 seconds)

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 1

The handler CGI program in IRIX allows arbitrary command execution. • https://www.exploit-db.com/exploits/19303 ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX http://www.securityfocus.com/bid/380 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed. • https://www.exploit-db.com/exploits/19357 http://marc.info/?l=bugtraq&m=87602746719552&w=2 http://www.securityfocus.com/bid/471 •

CVSS: 7.3EPSS: 0%CPEs: 4EXPL: 0

IRIX fam service allows an attacker to obtain a list of all files on the server. • http://www.osvdb.org/164 http://www.securityfocus.com/bid/353 https://exchange.xforce.ibmcloud.com/vulnerabilities/325 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. • ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX http://ciac.llnl.gov/ciac/bulletins/h-65.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2109 •

CVSS: 8.4EPSS: 0%CPEs: 8EXPL: 2

IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. • https://www.exploit-db.com/exploits/336 https://www.exploit-db.com/exploits/19310 ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX http://www.ciac.org/ciac/bulletins/h-106.shtml http://www.osvdb.org/990 https://exchange.xforce.ibmcloud.com/vulnerabilities/557 • CWE-434: Unrestricted Upload of File with Dangerous Type •