Page 8 of 146 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 10EXPL: 1

20 Oct 2000 — inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file. • https://www.exploit-db.com/exploits/20130 •

CVSS: 10.0EPSS: 5%CPEs: 20EXPL: 3

13 Oct 2000 — Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. • https://www.exploit-db.com/exploits/20149 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

21 Sep 2000 — Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview. • https://www.exploit-db.com/exploits/20127 •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 1

21 Sep 2000 — The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files. • https://www.exploit-db.com/exploits/20137 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 2

21 Jun 2000 — IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0204.html •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 2

12 Apr 2000 — The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon. • http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html •

CVSS: 10.0EPSS: 5%CPEs: 8EXPL: 1

27 Mar 2000 — Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts. • https://www.exploit-db.com/exploits/19822 •

CVSS: 9.8EPSS: 5%CPEs: 10EXPL: 1

01 Mar 2000 — SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters. • https://www.exploit-db.com/exploits/19788 •

CVSS: 10.0EPSS: 3%CPEs: 32EXPL: 1

08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 •

CVSS: 10.0EPSS: 18%CPEs: 31EXPL: 1

08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 •