Page 2 of 74 results (0.000 seconds)

CVSS: 10.0EPSS: 1%CPEs: 48EXPL: 0

03 Jul 2002 — xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges. xfsmd para IRIX 6.5 a la 6.5.16 utiliza una autenticación débil, lo cual permite a atacantes remotos la llamada de funciones RPC peligrosas, incluyendo aquellas que permiten montar y desmontar sistemas de ficheros xfs, para obtener permisos de root. • ftp://patches.sgi.com/support/free/security/advisories/20020606-01-I •

CVSS: 7.8EPSS: 0%CPEs: 41EXPL: 0

16 May 2002 — Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges. Desbordamiento de buffer en cpr para el paquete de software eoe.sw.cpr SGI Checkpoint-Restart Software package en SGI IRIX 6.5.10 y anteriores pueden permitir a los usuarios locales ganar privilegios de root. • ftp://patches.sgi.com/support/free/security/advisories/20020409-01-I •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

06 Dec 2001 — SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay. SGI IRIX 6.5 a 6.5.12f y posiblemente versiones anteriores, y FreeBSD 3.0, permiten a un atacante remoto producir una denegación de servicio mediante un paquete un paquete IGMP malformado con un pequeño retardo de respuesta. • ftp://patches.sgi.com/support/free/security/advisories/20011001-01-P •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

06 Dec 2001 — lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P •

CVSS: 10.0EPSS: 78%CPEs: 1EXPL: 1

22 Nov 2001 — lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/10033 •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

22 Nov 2001 — Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P •

CVSS: 9.8EPSS: 9%CPEs: 15EXPL: 0

04 Sep 2001 — Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

27 Jun 2001 — Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 4

27 Jun 2001 — Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option. • https://www.exploit-db.com/exploits/270 •

CVSS: 10.0EPSS: 35%CPEs: 51EXPL: 4

24 May 2001 — Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 •