Filtered by vendor Sgi
Subscriptions
Filtered by product Irix
Subscriptions
Total
187 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-0125 | 3 Redhat, Sgi, Sun | 4 Linux, Irix, Solaris and 1 more | 2025-04-03 | N/A |
Buffer overflow in SGI IRIX mailx program. | ||||
CVE-1999-0148 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
The handler CGI program in IRIX allows arbitrary command execution. | ||||
CVE-1999-0149 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack. | ||||
CVE-1999-0241 | 3 Sgi, Sun, Xfree86 Project | 4 Irix, Solaris, Sunos and 1 more | 2025-04-03 | N/A |
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. | ||||
CVE-1999-0270 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. | ||||
CVE-1999-0314 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | ||||
CVE-1999-0328 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
SGI permissions program allows local users to gain root privileges. | ||||
CVE-1999-0461 | 2 Linux, Sgi | 2 Linux Kernel, Irix | 2025-04-03 | N/A |
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | ||||
CVE-1999-1102 | 4 Apple, Bsd, Sgi and 1 more | 4 A Ux, Bsd, Irix and 1 more | 2025-04-03 | N/A |
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. | ||||
CVE-1999-1116 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Vulnerability in runpriv in Indigo Magic System Administration subsystem of SGI IRIX 6.3 and 6.4 allows local users to gain root privileges. | ||||
CVE-1999-1286 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. | ||||
CVE-1999-1384 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. | ||||
CVE-1999-1485 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
nsd in IRIX 6.5 through 6.5.2 exports a virtual filesystem on a UDP port, which allows remote attackers to view files and cause a possible denial of service by mounting the nsd virtual file system. | ||||
CVE-1999-1492 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges. | ||||
CVE-1999-1494 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument. | ||||
CVE-2000-0207 | 1 Sgi | 2 Infosearch, Irix | 2025-04-03 | N/A |
SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters. | ||||
CVE-2002-0174 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
nsd on SGI IRIX before 6.5.11 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the nsd.dump file. | ||||
CVE-2001-1456 | 4 Mcafee, Network Associates, Pgp and 1 more | 5 Webshield Smtp, Gauntlet Firewall, Mcafee E-ppliance and 2 more | 2025-04-03 | N/A |
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. | ||||
CVE-2000-1220 | 2 Redhat, Sgi | 2 Linux, Irix | 2025-04-03 | N/A |
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. | ||||
CVE-2000-1221 | 3 Debian, Redhat, Sgi | 3 Debian Linux, Linux, Irix | 2025-04-03 | N/A |
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. |