Filtered by vendor Sgi
Subscriptions
Total
259 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-1317 | 4 Hp, Sgi, Sun and 1 more | 5 Hp-ux, Irix, Solaris and 2 more | 2025-04-03 | N/A |
Buffer overflow in Dispatch() routine for XFS font server (fs.auto) on Solaris 2.5.1 through 9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a certain XFS query. | ||||
CVE-2002-1318 | 4 Hp, Redhat, Samba and 1 more | 4 Cifs-9000 Server, Linux, Samba and 1 more | 2025-04-03 | N/A |
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string. | ||||
CVE-2003-0679 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files. | ||||
CVE-2004-0231 | 5 Gentoo, Midnight Commander, Redhat and 2 more | 6 Linux, Midnight Commander, Enterprise Linux and 3 more | 2025-04-03 | N/A |
Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations." | ||||
CVE-2004-0417 | 6 Cvs, Gentoo, Openbsd and 3 more | 6 Cvs, Linux, Openbsd and 3 more | 2025-04-03 | N/A |
Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space. | ||||
CVE-2004-0930 | 5 Conectiva, Gentoo, Redhat and 2 more | 8 Linux, Linux, Enterprise Linux and 5 more | 2025-04-03 | N/A |
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters. | ||||
CVE-2005-2925 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
runpriv in SGI IRIX allows local users to bypass intended restrictions and execute arbitrary commands via shell metacharacters in a command line for a privileged binary in /usr/sysadm/privbin. | ||||
CVE-1999-0018 | 3 Ibm, Sgi, Sun | 4 Aix, Irix, Solaris and 1 more | 2025-04-03 | N/A |
Buffer overflow in statd allows root privileges. | ||||
CVE-1999-0025 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in df command on SGI IRIX systems. | ||||
CVE-1999-0026 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in pset command on SGI IRIX systems. | ||||
CVE-1999-0027 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in eject command on SGI IRIX systems. | ||||
CVE-1999-0028 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | ||||
CVE-1999-0034 | 4 Bsdi, Larry Wall, Redhat and 1 more | 4 Bsd Os, Perl, Linux and 1 more | 2025-04-03 | N/A |
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. | ||||
CVE-1999-0083 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
getcwd() file descriptor leak in FTP. | ||||
CVE-1999-0108 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
The printers program in IRIX has a buffer overflow that gives root access to local users. | ||||
CVE-1999-0125 | 3 Redhat, Sgi, Sun | 4 Linux, Irix, Solaris and 1 more | 2025-04-03 | N/A |
Buffer overflow in SGI IRIX mailx program. | ||||
CVE-1999-0208 | 3 Ibm, Nec, Sgi | 5 Aix, Asl Ux 4800, Ews-ux V and 2 more | 2025-04-03 | N/A |
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. | ||||
CVE-1999-0215 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Routed allows attackers to append data to files. | ||||
CVE-2023-6917 | 2 Redhat, Sgi | 2 Enterprise Linux, Performance Co-pilot | 2025-04-01 | 6 Medium |
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation. |