Page 15 of 73 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

A buffer overflow in the SGI X server allows local users to gain root access through the X server font path. • ftp://patches.sgi.com/support/free/security/advisories/19990301-01-PX •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 2

The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. • https://www.exploit-db.com/exploits/19261 ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc http://marc.info/?l=bugtraq&m=90233906612929&w=2 http://www.iss.net/security_center/static/7577.php http://www.securityfocus.com/bid/331 http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •