Page 26 of 258 results (0.003 seconds)

CVSS: 7.5EPSS: 6%CPEs: 17EXPL: 1

xfsmd for IRIX 6.5 through 6.5.16 allows remote attackers to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs(). • https://www.exploit-db.com/exploits/21571 ftp://patches.sgi.com/support/free/security/advisories/20020605-01-I ftp://patches.sgi.com/support/free/security/advisories/20020606-01-I http://marc.info/?l=bugtraq&m=102459162909825&w=2 •

CVSS: 2.1EPSS: 0%CPEs: 14EXPL: 0

Vulnerability in the XFS file system for SGI IRIX before 6.5.12 allows local users to cause a denial of service (hang) by creating a file that is not properly processed by XFS. • ftp://patches.sgi.com/support/free/security/advisories/20020402-01-P http://www.iss.net/security_center/static/8839.php http://www.securityfocus.com/bid/4511 •

CVSS: 7.2EPSS: 0%CPEs: 44EXPL: 0

Unknown vulnerability in rpc.passwd in the nfs.sw.nis subsystem of SGI IRIX 6.5.15 and earlier allows local users to gain root privileges. • ftp://patches.sgi.com/support/free/security/advisories/20020601-01-P http://www.ciac.org/ciac/bulletins/m-087.shtml http://www.iss.net/security_center/static/9261.php http://www.kb.cert.org/vuls/id/430419 http://www.osvdb.org/834 http://www.securityfocus.com/bid/4939 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

MediaMail and MediaMail Pro in SGI IRIX 6.5.16 and earlier allows local users to force the program to dump core via certain arguments, which could allow the users to read sensitive data or gain privileges. • ftp://patches.sgi.com/support/free/security/advisories/20020602-01-I http://www.iss.net/security_center/static/9292.php http://www.securityfocus.com/bid/4959 •

CVSS: 2.1EPSS: 0%CPEs: 12EXPL: 0

netstat in SGI IRIX before 6.5.12 allows local users to determine the existence of files on the system, even if the users do not have the appropriate permissions. • ftp://patches.sgi.com/support/free/security/advisories/20020503-01-I http://www.iss.net/security_center/static/9023.php http://www.securityfocus.com/bid/4682 •