Page 30 of 153 results (0.013 seconds)

CVSS: 10.0EPSS: 54%CPEs: 10EXPL: 2

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 https://www.exploit-db.com/exploits/20259 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208 •

CVSS: 10.0EPSS: 1%CPEs: 20EXPL: 0

Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0073 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 1

SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. • https://www.exploit-db.com/exploits/20263 ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373 http://ciac.llnl.gov/ciac/bulletins/f-16.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2113 •

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 3

serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. • https://www.exploit-db.com/exploits/19351 http://www.securityfocus.com/archive/1/930 http://www.securityfocus.com/bid/464 https://exchange.xforce.ibmcloud.com/vulnerabilities/2111 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 2

Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command. • https://www.exploit-db.com/exploits/19354 http://ciac.llnl.gov/ciac/bulletins/e-33.shtml http://www.cert.org/advisories/CA-1994-13.html http://www.securityfocus.com/bid/468 https://exchange.xforce.ibmcloud.com/vulnerabilities/511 •