Filtered by vendor Sgi
Subscriptions
Filtered by product Irix
Subscriptions
Total
187 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-1791 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
SGI IRIX 6.5 through 6.5.17 creates temporary desktop files with world-writable permissions, which allows local users to overwrite or corrupt those files. | ||||
CVE-1999-0234 | 5 Caldera, Redhat, Sgi and 2 more | 5 Openlinux, Linux, Irix and 2 more | 2025-04-03 | N/A |
Bash treats any character with a value of 255 as a command separator. | ||||
CVE-1999-0270 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. | ||||
CVE-1999-0314 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | ||||
CVE-1999-0327 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
SGI syserr program allows local users to corrupt files. | ||||
CVE-1999-0329 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
SGI mediad program allows local users to gain root access. | ||||
CVE-1999-0413 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
A buffer overflow in the SGI X server allows local users to gain root access through the X server font path. | ||||
CVE-1999-0461 | 2 Linux, Sgi | 2 Linux Kernel, Irix | 2025-04-03 | N/A |
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | ||||
CVE-1999-1232 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program. | ||||
CVE-1999-1040 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Vulnerabilities in (1) ipxchk and (2) ipxlink in NetWare Client 1.0 on IRIX 6.3 and 6.4 allows local users to gain root access via a modified IFS environmental variable. | ||||
CVE-1999-0692 | 2 Cray, Sgi | 2 Unicos, Irix | 2025-04-03 | N/A |
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges. | ||||
CVE-1999-1401 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook). | ||||
CVE-1999-1409 | 2 Netbsd, Sgi | 2 Netbsd, Irix | 2025-04-03 | N/A |
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. | ||||
CVE-1999-1468 | 4 Cray, Next, Sgi and 1 more | 4 Unicos, Next, Irix and 1 more | 2025-04-03 | N/A |
rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. | ||||
CVE-2002-0017 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 through 6.5.15m allows remote attackers to execute arbitrary code via an SNMP request. | ||||
CVE-1999-0765 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor. | ||||
CVE-1999-0948 | 3 Sgi, Sun, Turbolinux | 4 Irix, Solaris, Sunos and 1 more | 2025-04-03 | N/A |
Buffer overflow in uum program for Canna input system allows local users to gain root privileges. | ||||
CVE-1999-0949 | 3 Sgi, Sun, Turbolinux | 4 Irix, Solaris, Sunos and 1 more | 2025-04-03 | N/A |
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. | ||||
CVE-1999-0960 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option. | ||||
CVE-1999-1461 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. |