Page 6 of 36 results (0.011 seconds)

CVSS: 7.2EPSS: 0%CPEs: 43EXPL: 5

Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. • https://www.exploit-db.com/exploits/331 https://www.exploit-db.com/exploits/322 https://www.exploit-db.com/exploits/19200 https://www.exploit-db.com/exploits/19201 https://www.exploit-db.com/exploits/19202 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040 •

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 2

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19313 ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420403&w=2 http://www.osvdb.org/993 http://www.securityfocus.com/bid/395 https://exchange.xforce.ibmcloud.com/vulnerabilities/2107 •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 2

Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. • https://www.exploit-db.com/exploits/19356 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I http://marc.info/?l=bugtraq&m=87602167420095&w=2 http://www.iss.net/security_center/static/7456.php http://www.securityfocus.com/bid/470 •

CVSS: 7.8EPSS: 0%CPEs: 39EXPL: 0

Local user gains root privileges via buffer overflow in rdist, via expstr() function. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179 • CWE-125: Out-of-bounds Read •