Page 4 of 96 results (0.004 seconds)

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 2

lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/10033 ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpsched2 http://www.securityfocus.com/bid/27566 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/irix/lpd/tagprinter_exec.rb •

CVSS: 7.5EPSS: 2%CPEs: 15EXPL: 0

Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I http://www.cert.org/advisories/CA-2001-25.html http://www.kb.cert.org/vuls/id/206723 http://www.securityfocus.com/bid/3290 https://exchange.xforce.ibmcloud.com/vulnerabilities/7088 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 1

Performance Metrics Collector Daemon (PMCD) in Performance Copilot in IRIX 6.x allows remote attackers to cause a denial of service (resource exhaustion) via an extremely long string to the PMCD port. • https://www.exploit-db.com/exploits/21431 ftp://patches.sgi.com/support/free/security/advisories/20020407-01-I http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html https://exchange.xforce.ibmcloud.com/vulnerabilities/4284 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P http://www.kb.cert.org/vuls/id/258632 http://www.osvdb.org/1822 http://www.securityfocus.com/bid/2714 http://xforce.iss.net/alerts/advise76.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6502 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option. • https://www.exploit-db.com/exploits/270 https://www.exploit-db.com/exploits/20804 ftp://patches.sgi.com/support/free/security/advisories/20010701-01-P http://archives.neohapsis.com/archives/bugtraq/2001-04/0475.html http://archives.neohapsis.com/archives/bugtraq/2001-04/0502.html http://www.osvdb.org/8571 http://www.securityfocus.com/bid/2656 https://exchange.xforce.ibmcloud.com/vulnerabilities/6473 •