Page 3 of 28 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

09 May 1997 — addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. • https://www.exploit-db.com/exploits/19260 •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 2

04 Jan 1997 — netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19313 •

CVSS: 7.8EPSS: 0%CPEs: 14EXPL: 2

30 Oct 1996 — Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. • https://www.exploit-db.com/exploits/19356 •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

03 Jan 1996 — Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations. • ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX •

CVSS: 10.0EPSS: 54%CPEs: 10EXPL: 2

12 Dec 1995 — rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

03 Mar 1995 — SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. • https://www.exploit-db.com/exploits/20263 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

22 Oct 1991 — rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html •

CVSS: 3.3EPSS: 0%CPEs: 2EXPL: 0

31 Oct 1990 — /usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users. • http://www.cert.org/advisories/CA-1990-08.html •