Page 3 of 19 results (0.018 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in On-Line Customer Registration software for IRIX 6.2 through 6.4 allows local users to gain root privileges. • ftp://patches.sgi.com/support/free/security/advisories/19980901-01-PX http://ciac.llnl.gov/ciac/bulletins/j-003.shtml http://www.iss.net/security_center/static/7441.php •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. • ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX http://ciac.llnl.gov/ciac/bulletins/h-65.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2109 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.osvdb.org/8560 http://www.securityfocus.com/bid/330 https://exchange.xforce.ibmcloud.com/vulnerabilities/1433 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 2

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19313 ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420403&w=2 http://www.osvdb.org/993 http://www.securityfocus.com/bid/395 https://exchange.xforce.ibmcloud.com/vulnerabilities/2107 •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 2

Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. • https://www.exploit-db.com/exploits/19356 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I http://marc.info/?l=bugtraq&m=87602167420095&w=2 http://www.iss.net/security_center/static/7456.php http://www.securityfocus.com/bid/470 •