Filtered by vendor Sgi Subscriptions
Total 259 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2005-0113 1 Sgi 1 Irix 2025-04-03 N/A
inpview in SGI IRIX allows local users to execute arbitrary commands via the SUN_TTSESSION_CMD environment variable, which is executed by inpview without dropping privileges.
CVE-2004-0081 23 4d, Apple, Avaya and 20 more 67 Webstar, Mac Os X, Mac Os X Server and 64 more 2025-04-03 N/A
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
CVE-2004-0492 6 Apache, Hp, Ibm and 3 more 8 Http Server, Virtualvault, Vvos and 5 more 2025-04-03 N/A
Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
CVE-2004-0520 4 Open Webmail, Redhat, Sgi and 1 more 4 Open Webmail, Enterprise Linux, Propack and 1 more 2025-04-03 N/A
Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php.
CVE-2004-0521 3 Redhat, Sgi, Squirrelmail 3 Enterprise Linux, Propack, Squirrelmail 2025-04-03 N/A
SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.
CVE-2004-0639 3 Open Webmail, Sgi, Squirrelmail 3 Open Webmail, Propack, Squirrelmail 2025-04-03 N/A
Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and earlier allow remote attackers to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.
CVE-1999-0036 1 Sgi 1 Irix 2025-04-03 8.4 High
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.
CVE-1999-0018 3 Ibm, Sgi, Sun 4 Aix, Irix, Solaris and 1 more 2025-04-03 N/A
Buffer overflow in statd allows root privileges.
CVE-1999-0025 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in df command on SGI IRIX systems.
CVE-1999-0026 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in pset command on SGI IRIX systems.
CVE-1999-0028 1 Sgi 1 Irix 2025-04-03 N/A
root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
CVE-1999-0033 5 Ibm, Ncr, Sco and 2 more 7 Aix, Mp-ras, Open Desktop and 4 more 2025-04-03 N/A
Command execution in Sun systems via buffer overflow in the at program.
CVE-1999-0035 2 Gnu, Sgi 2 Inet, Irix 2025-04-03 N/A
Race condition in signal handling routine in ftpd, allowing read/write arbitrary files.
CVE-1999-0034 4 Bsdi, Larry Wall, Redhat and 1 more 4 Bsd Os, Perl, Linux and 1 more 2025-04-03 N/A
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
CVE-1999-0044 1 Sgi 1 Irix 2025-04-03 N/A
fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.
CVE-1999-0083 1 Sgi 1 Irix 2025-04-03 N/A
getcwd() file descriptor leak in FTP.
CVE-1999-0108 1 Sgi 1 Irix 2025-04-03 N/A
The printers program in IRIX has a buffer overflow that gives root access to local users.
CVE-1999-0125 3 Redhat, Sgi, Sun 4 Linux, Irix, Solaris and 1 more 2025-04-03 N/A
Buffer overflow in SGI IRIX mailx program.
CVE-2023-6917 2 Redhat, Sgi 2 Enterprise Linux, Performance Co-pilot 2025-04-01 6 Medium
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.