Vulnerabilities
Vulnerable Software
Sgi:  >> Irix  >> 6.5.3  Security Vulnerabilities
The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system.
CVSS Score
5.0
EPSS Score
0.014
Published
2001-02-16
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
CVSS Score
10.0
EPSS Score
0.009
Published
2000-11-14
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
CVSS Score
10.0
EPSS Score
0.056
Published
2000-10-20
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
CVSS Score
3.7
EPSS Score
0.002
Published
2000-10-20
The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.
CVSS Score
6.4
EPSS Score
0.007
Published
2000-04-12
SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters.
CVSS Score
7.5
EPSS Score
0.054
Published
2000-03-01
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
CVSS Score
10.0
EPSS Score
0.031
Published
2000-01-08
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
CVSS Score
10.0
EPSS Score
0.122
Published
2000-01-08
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
CVSS Score
10.0
EPSS Score
0.005
Published
1999-07-19
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
CVSS Score
10.0
EPSS Score
0.013
Published
1999-01-28


Contact Us

Shodan ® - All rights reserved