Filtered by vendor Sgi Subscriptions
Total 259 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2002-1317 4 Hp, Sgi, Sun and 1 more 5 Hp-ux, Irix, Solaris and 2 more 2025-04-03 N/A
Buffer overflow in Dispatch() routine for XFS font server (fs.auto) on Solaris 2.5.1 through 9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a certain XFS query.
CVE-2002-1318 4 Hp, Redhat, Samba and 1 more 4 Cifs-9000 Server, Linux, Samba and 1 more 2025-04-03 N/A
Buffer overflow in samba 2.2.2 through 2.2.6 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-endian UCS2 unicode string.
CVE-2003-0679 1 Sgi 1 Irix 2025-04-03 N/A
Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files.
CVE-2004-0231 5 Gentoo, Midnight Commander, Redhat and 2 more 6 Linux, Midnight Commander, Enterprise Linux and 3 more 2025-04-03 N/A
Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
CVE-2004-0417 6 Cvs, Gentoo, Openbsd and 3 more 6 Cvs, Linux, Openbsd and 3 more 2025-04-03 N/A
Integer overflow in the "Max-dotdot" CVS protocol command (serve_max_dotdot) for CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, may allow remote attackers to cause a server crash, which could cause temporary data to remain undeleted and consume disk space.
CVE-2004-0930 5 Conectiva, Gentoo, Redhat and 2 more 8 Linux, Linux, Enterprise Linux and 5 more 2025-04-03 N/A
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
CVE-2005-2925 1 Sgi 1 Irix 2025-04-03 N/A
runpriv in SGI IRIX allows local users to bypass intended restrictions and execute arbitrary commands via shell metacharacters in a command line for a privileged binary in /usr/sysadm/privbin.
CVE-1999-0018 3 Ibm, Sgi, Sun 4 Aix, Irix, Solaris and 1 more 2025-04-03 N/A
Buffer overflow in statd allows root privileges.
CVE-1999-0025 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in df command on SGI IRIX systems.
CVE-1999-0026 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in pset command on SGI IRIX systems.
CVE-1999-0027 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in eject command on SGI IRIX systems.
CVE-1999-0028 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
CVE-1999-0034 4 Bsdi, Larry Wall, Redhat and 1 more 4 Bsd Os, Perl, Linux and 1 more 2025-04-03 N/A
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
CVE-1999-0083 1 Sgi 1 Irix 2025-04-03 N/A
getcwd() file descriptor leak in FTP.
CVE-1999-0108 1 Sgi 1 Irix 2025-04-03 N/A
The printers program in IRIX has a buffer overflow that gives root access to local users.
CVE-1999-0125 3 Redhat, Sgi, Sun 4 Linux, Irix, Solaris and 1 more 2025-04-03 N/A
Buffer overflow in SGI IRIX mailx program.
CVE-1999-0208 3 Ibm, Nec, Sgi 5 Aix, Asl Ux 4800, Ews-ux V and 2 more 2025-04-03 N/A
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
CVE-1999-0215 1 Sgi 1 Irix 2025-04-03 N/A
Routed allows attackers to append data to files.
CVE-2023-6917 2 Redhat, Sgi 2 Enterprise Linux, Performance Co-pilot 2025-04-01 6 Medium
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.