Page 9 of 53 results (0.009 seconds)

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Csetup under IRIX allows arbitrary file creation or overwriting. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0049 •

CVSS: 7.2EPSS: 0%CPEs: 50EXPL: 3

Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. • https://www.exploit-db.com/exploits/19066 https://www.exploit-db.com/exploits/19067 https://www.exploit-db.com/exploits/19350 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0051 •

CVSS: 4.6EPSS: 0%CPEs: 7EXPL: 2

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/19313 ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420403&w=2 http://www.osvdb.org/993 http://www.securityfocus.com/bid/395 https://exchange.xforce.ibmcloud.com/vulnerabilities/2107 •

CVSS: 4.6EPSS: 0%CPEs: 12EXPL: 0

Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook). • ftp://patches.sgi.com/support/free/security/advisories/19961201-01-PX http://www.iss.net/security_center/static/7575.php http://www.osvdb.org/8563 http://www.securityfocus.com/bid/463 •

CVSS: 7.2EPSS: 0%CPEs: 14EXPL: 2

Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. • https://www.exploit-db.com/exploits/19356 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I http://marc.info/?l=bugtraq&m=87602167420095&w=2 http://www.iss.net/security_center/static/7456.php http://www.securityfocus.com/bid/470 •