Page 9 of 57 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 2

inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 1

webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. • https://www.exploit-db.com/exploits/19299 ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX http://www.cert.org/advisories/CA-1997-12.html http://www.osvdb.org/235 http://www.securityfocus.com/bid/374 https://exchange.xforce.ibmcloud.com/vulnerabilities/333 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.2EPSS: 0%CPEs: 43EXPL: 5

Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. • https://www.exploit-db.com/exploits/331 https://www.exploit-db.com/exploits/322 https://www.exploit-db.com/exploits/19200 https://www.exploit-db.com/exploits/19201 https://www.exploit-db.com/exploits/19202 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040 •

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 7EXPL: 1

IRIX startmidi program allows local users to modify arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19355 ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX http://www.osvdb.org/8447 http://www.securityfocus.com/bid/469 https://exchange.xforce.ibmcloud.com/vulnerabilities/1634 •