Page 14 of 96 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program. • http://marc.info/?l=bugtraq&m=87602167420994&w=2 http://www.osvdb.org/8559 https://exchange.xforce.ibmcloud.com/vulnerabilities/3316 •

CVSS: 6.2EPSS: 0%CPEs: 10EXPL: 2

addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.securityfocus.com/bid/330 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.osvdb.org/8560 http://www.securityfocus.com/bid/330 https://exchange.xforce.ibmcloud.com/vulnerabilities/1433 •

CVSS: 6.2EPSS: 0%CPEs: 14EXPL: 2

Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. • https://www.exploit-db.com/exploits/19358 http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.insecure.org/sploits/irix.xfsdump.html http://www.securityfocus.com/bid/472 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •