Page 9 of 85 results (0.003 seconds)

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 2

Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19353 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.17.suid_exec.vul ftp://patches.sgi.com/support/free/security/advisories/19980405-01-I http://ciac.llnl.gov/ciac/bulletins/h-15a.shtml http://www.securityfocus.com/bid/467 https://exchange.xforce.ibmcloud.com/vulnerabilities/2100 •

CVSS: 10.0EPSS: 9%CPEs: 76EXPL: 2

Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. • ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P http://www.ciac.org/ciac/bulletins/i-041.shtml http://www.osvdb.org/134 http://www.securityfocus.com/bid/64 https://exchange.xforce.ibmcloud.com/vulnerabilities/810 •

CVSS: 10.0EPSS: 4%CPEs: 31EXPL: 2

Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 https://www.exploit-db.com/exploits/19101 ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX http://www.securityfocus.com/bid/122 •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option. • https://www.exploit-db.com/exploits/19262 ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX •