Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-import-export-lite domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the insert-headers-and-footers domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121
gr_osview Information Disclosure Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
IRIX
by:
SecurityFocus
7.2
CVSS
HIGH
Information Disclosure
200
CWE
Product Name: IRIX
Affected Version From: SGI IRIX 6.5.22
Affected Version To: SGI IRIX 6.5.22
Patch Exists: No
Related CWE: CVE-2004-0753
CPE: o:sgi:irix
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2004

gr_osview Information Disclosure Vulnerability

gr_osview is prone to an information disclosure vulnerability, which can be exploited by a local attacker to obtain sensitive information such as exposing an administrator's password hash. This issue has been confirmed in SGI IRIX 6.5.22 maintenance release, and other versions of IRIX may be vulnerable as well. The attacker can exploit this vulnerability by running the command 'gr_osview -d -D /etc/shadow'.

Mitigation:

No known mitigation or remediation for this vulnerability.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/13057/info

gr_osview is reported prone to an information disclosure vulnerability. This issue can help a local attacker to obtain sensitive information such as exposing an administrator's password hash and carrying out other attacks.

This issue has been confirmed in SGI IRIX 6.5.22 maintenance release. Other versions of IRIX may be vulnerable as well. 

gr_osview -d -D /etc/shadow 
cqrsecured