Page 17 of 85 results (0.004 seconds)

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 3

serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. • https://www.exploit-db.com/exploits/19351 http://www.securityfocus.com/archive/1/930 http://www.securityfocus.com/bid/464 https://exchange.xforce.ibmcloud.com/vulnerabilities/2111 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command. • https://www.exploit-db.com/exploits/19354 http://ciac.llnl.gov/ciac/bulletins/e-33.shtml http://www.cert.org/advisories/CA-1994-13.html http://www.securityfocus.com/bid/468 https://exchange.xforce.ibmcloud.com/vulnerabilities/511 •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 2

colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument. • https://www.exploit-db.com/exploits/19269 ftp://patches.sgi.com/support/free/security/advisories/19950209-01-P http://www.securityfocus.com/archive/1/675 http://www.securityfocus.com/bid/336 http://www.tryc.on.ca/archives/bugtraq/1995_1/0614.html https://exchange.xforce.ibmcloud.com/vulnerabilities/2112 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

/usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users. • http://www.cert.org/advisories/CA-1990-08.html http://www.iss.net/security_center/static/3164.php http://www.securityfocus.com/bid/13 •