Page 3 of 57 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpstat2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7639 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay. SGI IRIX 6.5 a 6.5.12f y posiblemente versiones anteriores, y FreeBSD 3.0, permiten a un atacante remoto producir una denegación de servicio mediante un paquete un paquete IGMP malformado con un pequeño retardo de respuesta. • ftp://patches.sgi.com/support/free/security/advisories/20011001-01-P http://www.freebsd.org/cgi/query-pr.cgi?pr=8990 http://www.securityfocus.com/bid/3463 https://exchange.xforce.ibmcloud.com/vulnerabilities/7332 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpsched2 http://www.osvdb.org/8572 https://exchange.xforce.ibmcloud.com/vulnerabilities/7641 •

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 2

lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/10033 ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpsched2 http://www.securityfocus.com/bid/27566 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/irix/lpd/tagprinter_exec.rb •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P http://www.kb.cert.org/vuls/id/258632 http://www.osvdb.org/1822 http://www.securityfocus.com/bid/2714 http://xforce.iss.net/alerts/advise76.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6502 •