Page 26 of 187 results (0.003 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands. • http://marc.info/?l=bugtraq&m=89217373930054&w=2 http://www.securityfocus.com/bid/70 http://www.securityfocus.com/bid/71 •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 2

Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19353 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.17.suid_exec.vul ftp://patches.sgi.com/support/free/security/advisories/19980405-01-I http://ciac.llnl.gov/ciac/bulletins/h-15a.shtml http://www.securityfocus.com/bid/467 https://exchange.xforce.ibmcloud.com/vulnerabilities/2100 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. • ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P http://www.ciac.org/ciac/bulletins/i-041.shtml http://www.osvdb.org/134 http://www.securityfocus.com/bid/64 https://exchange.xforce.ibmcloud.com/vulnerabilities/810 •

CVSS: 7.6EPSS: 0%CPEs: 2EXPL: 0

System Manager sysmgr GUI in SGI IRIX 6.4 and 6.3 allows remote attackers to execute commands by providing a trojan horse (1) runtask or (2) runexec descriptor file, which is used to execute a System Manager Task when the user's Mailcap entry supports the x-sgi-task or x-sgi-exec type. • ftp://patches.sgi.com/support/free/security/advisories/19980403-01-PX ftp://patches.sgi.com/support/free/security/advisories/19980403-02-PX http://www.iss.net/security_center/static/809.php http://www.osvdb.org/8556 •

CVSS: 10.0EPSS: 4%CPEs: 31EXPL: 2

Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 https://www.exploit-db.com/exploits/19101 ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX http://www.securityfocus.com/bid/122 •