Page 7 of 65 results (0.003 seconds)

CVSS: 10.0EPSS: 5%CPEs: 20EXPL: 3

13 Oct 2000 — Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. • https://www.exploit-db.com/exploits/20149 •

CVSS: 9.8EPSS: 3%CPEs: 10EXPL: 1

01 Mar 2000 — SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters. • https://www.exploit-db.com/exploits/19788 •

CVSS: 10.0EPSS: 1%CPEs: 32EXPL: 1

08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 •

CVSS: 10.0EPSS: 1%CPEs: 31EXPL: 1

08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 2

07 May 1997 — inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 •