Filtered by vendor Sgi
Subscriptions
Filtered by product Irix
Subscriptions
Total
187 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-1999-0032 | 5 Bsdi, Freebsd, Next and 2 more | 5 Bsd Os, Freebsd, Nextstep and 2 more | 2025-04-03 | N/A |
| Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. | ||||
| CVE-1999-0033 | 5 Ibm, Ncr, Sco and 2 more | 7 Aix, Mp-ras, Open Desktop and 4 more | 2025-04-03 | N/A |
| Command execution in Sun systems via buffer overflow in the at program. | ||||
| CVE-1999-0038 | 7 Bsdi, Data General, Debian and 4 more | 8 Bsd Os, Dg Ux, Debian Linux and 5 more | 2025-04-03 | 8.4 High |
| Buffer overflow in xlock program allows local users to execute commands as root. | ||||
| CVE-1999-0044 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| fsdump command in IRIX allows local users to obtain root access by modifying sensitive files. | ||||
| CVE-1999-0049 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| Csetup under IRIX allows arbitrary file creation or overwriting. | ||||
| CVE-1999-0051 | 3 Globetrotter, Sgi, Sun | 5 Flexlm, Irix, License Oeo and 2 more | 2025-04-03 | N/A |
| Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. | ||||
| CVE-2000-0733 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. | ||||
| CVE-1999-0073 | 2 Digital, Sgi | 3 Osf 1, Unix, Irix | 2025-04-03 | N/A |
| Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. | ||||
| CVE-1999-0083 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| getcwd() file descriptor leak in FTP. | ||||
| CVE-1999-0108 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| The printers program in IRIX has a buffer overflow that gives root access to local users. | ||||
| CVE-1999-0125 | 3 Redhat, Sgi, Sun | 4 Linux, Irix, Solaris and 1 more | 2025-04-03 | N/A |
| Buffer overflow in SGI IRIX mailx program. | ||||
| CVE-1999-0148 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| The handler CGI program in IRIX allows arbitrary command execution. | ||||
| CVE-1999-0149 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack. | ||||
| CVE-1999-0327 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| SGI syserr program allows local users to corrupt files. | ||||
| CVE-1999-0413 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| A buffer overflow in the SGI X server allows local users to gain root access through the X server font path. | ||||
| CVE-1999-0461 | 2 Linux, Sgi | 2 Linux Kernel, Irix | 2025-04-03 | N/A |
| Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | ||||
| CVE-1999-1022 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. | ||||
| CVE-1999-1067 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities. | ||||
| CVE-2000-0893 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system. | ||||
| CVE-2002-0355 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| netstat in SGI IRIX before 6.5.12 allows local users to determine the existence of files on the system, even if the users do not have the appropriate permissions. | ||||