Page 2 of 66 results (0.004 seconds)

CVSS: 7.8EPSS: 0%CPEs: 41EXPL: 0

16 May 2002 — Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges. Desbordamiento de buffer en cpr para el paquete de software eoe.sw.cpr SGI Checkpoint-Restart Software package en SGI IRIX 6.5.10 y anteriores pueden permitir a los usuarios locales ganar privilegios de root. • ftp://patches.sgi.com/support/free/security/advisories/20020409-01-I •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

06 Dec 2001 — SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay. SGI IRIX 6.5 a 6.5.12f y posiblemente versiones anteriores, y FreeBSD 3.0, permiten a un atacante remoto producir una denegación de servicio mediante un paquete un paquete IGMP malformado con un pequeño retardo de respuesta. • ftp://patches.sgi.com/support/free/security/advisories/20011001-01-P •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

06 Dec 2001 — lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P •

CVSS: 10.0EPSS: 78%CPEs: 1EXPL: 1

22 Nov 2001 — lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/10033 •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

22 Nov 2001 — Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P •

CVSS: 9.8EPSS: 9%CPEs: 15EXPL: 0

04 Sep 2001 — Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 4%CPEs: 3EXPL: 1

31 Aug 2001 — Performance Metrics Collector Daemon (PMCD) in Performance Copilot in IRIX 6.x allows remote attackers to cause a denial of service (resource exhaustion) via an extremely long string to the PMCD port. • https://www.exploit-db.com/exploits/21431 •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 0

27 Jun 2001 — Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P •

CVSS: 10.0EPSS: 35%CPEs: 51EXPL: 4

24 May 2001 — Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 •

CVSS: 10.0EPSS: 0%CPEs: 74EXPL: 13

14 Nov 2000 — Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 • CWE-264: Permissions, Privileges, and Access Controls •