Filtered by vendor Sgi Subscriptions
Filtered by product Irix Subscriptions
Total 187 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2003-0573 1 Sgi 1 Irix 2025-04-03 N/A
The DNS callbacks in nsd in SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, do not perform sufficient sanity checking, with unknown impact.
CVE-2005-0139 1 Sgi 1 Irix 2025-04-03 N/A
Unknown vulnerability in rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not sufficiently restrict access rights for read-mostly exports, which allows attackers to conduct unauthorized activities.
CVE-1999-0019 7 Data General, Ibm, Ncr and 4 more 10 Dg Ux, Aix, Mp-ras and 7 more 2025-04-03 N/A
Delete or create a file via rpc.statd, due to invalid information.
CVE-1999-0149 1 Sgi 1 Irix 2025-04-03 N/A
The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack.
CVE-1999-1554 1 Sgi 1 Irix 2025-04-03 N/A
/usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users.
CVE-2000-0798 1 Sgi 1 Irix 2025-04-03 N/A
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
CVE-2005-2925 1 Sgi 1 Irix 2025-04-03 N/A
runpriv in SGI IRIX allows local users to bypass intended restrictions and execute arbitrary commands via shell metacharacters in a command line for a privileged binary in /usr/sysadm/privbin.
CVE-2001-0331 1 Sgi 1 Irix 2025-04-03 N/A
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands.
CVE-1999-0030 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in xlock command on SGI IRIX systems.
CVE-1999-0059 1 Sgi 1 Irix 2025-04-03 7.3 High
IRIX fam service allows an attacker to obtain a list of all files on the server.
CVE-1999-0241 3 Sgi, Sun, Xfree86 Project 4 Irix, Solaris, Sunos and 1 more 2025-04-03 N/A
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.
CVE-1999-1067 1 Sgi 1 Irix 2025-04-03 N/A
SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities.
CVE-1999-1398 1 Sgi 1 Irix 2025-04-03 N/A
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
CVE-1999-1485 1 Sgi 1 Irix 2025-04-03 N/A
nsd in IRIX 6.5 through 6.5.2 exports a virtual filesystem on a UDP port, which allows remote attackers to view files and cause a possible denial of service by mounting the nsd virtual file system.
CVE-2000-1193 1 Sgi 1 Irix 2025-04-03 N/A
Performance Metrics Collector Daemon (PMCD) in Performance Copilot in IRIX 6.x allows remote attackers to cause a denial of service (resource exhaustion) via an extremely long string to the PMCD port.
CVE-2001-0800 1 Sgi 1 Irix 2025-04-03 N/A
lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
CVE-2002-1317 4 Hp, Sgi, Sun and 1 more 5 Hp-ux, Irix, Solaris and 2 more 2025-04-03 N/A
Buffer overflow in Dispatch() routine for XFS font server (fs.auto) on Solaris 2.5.1 through 9 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a certain XFS query.
CVE-2003-0679 1 Sgi 1 Irix 2025-04-03 N/A
Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files.
CVE-2001-0485 1 Sgi 1 Irix 2025-04-03 N/A
Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option.
CVE-2000-1220 2 Redhat, Sgi 2 Linux, Irix 2025-04-03 N/A
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.