Page 8 of 57 results (0.021 seconds)

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. • ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX http://ciac.llnl.gov/ciac/bulletins/h-65.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2109 •

CVSS: 8.4EPSS: 0%CPEs: 8EXPL: 2

IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. • https://www.exploit-db.com/exploits/336 https://www.exploit-db.com/exploits/19310 ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX http://www.ciac.org/ciac/bulletins/h-106.shtml http://www.osvdb.org/990 https://exchange.xforce.ibmcloud.com/vulnerabilities/557 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.2EPSS: 0%CPEs: 10EXPL: 2

addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.securityfocus.com/bid/330 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.osvdb.org/8560 http://www.securityfocus.com/bid/330 https://exchange.xforce.ibmcloud.com/vulnerabilities/1433 •

CVSS: 6.2EPSS: 0%CPEs: 14EXPL: 2

Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. • https://www.exploit-db.com/exploits/19358 http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.insecure.org/sploits/irix.xfsdump.html http://www.securityfocus.com/bid/472 •