Page 16 of 147 results (0.006 seconds)

CVSS: 3.7EPSS: 0%CPEs: 2EXPL: 2

IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0204.html http://www.securityfocus.com/bid/1413 •

CVSS: 6.4EPSS: 0%CPEs: 8EXPL: 2

The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon. • http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html http://www.securityfocus.com/bid/1106 •

CVSS: 10.0EPSS: 8%CPEs: 8EXPL: 1

Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts. • https://www.exploit-db.com/exploits/19822 ftp://sgigate.sgi.com/security/20000303-01-PX http://www.ciac.org/ciac/bulletins/k-030.shtml http://www.osvdb.org/1267 http://www.securityfocus.com/bid/1079 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003290852.aa27218%40blaze.arl.mil https://exchange.xforce.ibmcloud.com/vulnerabilities/4206 •

CVSS: 7.5EPSS: 3%CPEs: 10EXPL: 1

SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters. • https://www.exploit-db.com/exploits/19788 ftp://patches.sgi.com/support/free/security/advisories/20000501-01-P http://www.securityfocus.com/bid/1031 •

CVSS: 10.0EPSS: 2%CPEs: 31EXPL: 1

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://rhn.redhat.com/errata/RHSA-2000-002.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/30308 http://www.l0pht.com/advisories/lpd_advisory http://www.securityfocus.com/bid/927 https://exchange.xforce.ibmcloud.com/vulnerabilities/3840 •