Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
Max CVSS
10.0
EPSS Score
8.73%
Published
2000-03-27
Updated
2017-10-10
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Max CVSS
10.0
EPSS Score
1.53%
Published
2000-10-20
Updated
2008-09-05
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
Max CVSS
10.0
EPSS Score
0.78%
Published
2000-10-20
Updated
2008-09-05
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
Max CVSS
10.0
EPSS Score
0.48%
Published
2000-11-14
Updated
2018-10-30
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Max CVSS
10.0
EPSS Score
1.07%
Published
2000-01-08
Updated
2017-07-11
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
Max CVSS
10.0
EPSS Score
2.10%
Published
2000-01-08
Updated
2017-07-11
SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters.
Max CVSS
7.5
EPSS Score
3.10%
Published
2000-03-01
Updated
2008-09-10
Vulnerability in cvconnect in SGI IRIX WorkShop allows local users to overwrite arbitrary files.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-06-20
Updated
2017-10-10
Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-05
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-05
Buffer overflow in dmplay in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long command line option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.
Max CVSS
6.4
EPSS Score
0.30%
Published
2000-04-12
Updated
2008-09-10
Buffer overflow in mailx mail command (aka Mail) on Linux systems allows local users to gain privileges via a long -c (carbon copy) parameter.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-08-08
Updated
2008-09-10
SGI MIPSPro compilers C, C++, F77 and F90 generate temporary files in /tmp with predictable file names, which could allow local users to insert malicious contents into these files as they are being compiled by another user.
Max CVSS
3.7
EPSS Score
0.05%
Published
2000-06-21
Updated
2008-09-10
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited.
Max CVSS
3.7
EPSS Score
0.05%
Published
2000-06-21
Updated
2008-09-10
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
Max CVSS
3.7
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
17 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!