Page 5 of 25 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations. • ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX http://www.iss.net/security_center/static/7430.php •

CVSS: 10.0EPSS: 54%CPEs: 10EXPL: 2

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 https://www.exploit-db.com/exploits/20259 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. • https://www.exploit-db.com/exploits/20263 ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373 http://ciac.llnl.gov/ciac/bulletins/f-16.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2113 •

CVSS: 6.2EPSS: 0%CPEs: 15EXPL: 0

rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html http://www.cert.org/advisories/CA-91.20.rdist.vulnerability http://www.iss.net/security_center/static/7160.php http://www.osvdb.org/8106 http://www.securityfocus.com/bid/31 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

/usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users. • http://www.cert.org/advisories/CA-1990-08.html http://www.iss.net/security_center/static/3164.php http://www.securityfocus.com/bid/13 •