Filtered by vendor Sgi
Subscriptions
Total
259 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-1791 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
SGI IRIX 6.5 through 6.5.17 creates temporary desktop files with world-writable permissions, which allows local users to overwrite or corrupt those files. | ||||
CVE-2003-0028 | 11 Cray, Freebsd, Gnu and 8 more | 15 Unicos, Freebsd, Glibc and 12 more | 2025-04-03 | N/A |
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. | ||||
CVE-2003-0064 | 4 Hp, Ibm, Sgi and 1 more | 5 Hp-ux, Aix, Irix and 2 more | 2025-04-03 | N/A |
The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. | ||||
CVE-2003-0174 | 1 Sgi | 1 Irix | 2025-04-03 | 9.8 Critical |
The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password. | ||||
CVE-2003-0473 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Unknown vulnerability in the IPv6 capability in IRIX 6.5.19 causes snoop to process packets as the root user, with unknown implications. | ||||
CVE-2003-0573 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
The DNS callbacks in nsd in SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, do not perform sufficient sanity checking, with unknown impact. | ||||
CVE-1999-0029 | 1 Sgi | 1 Irix | 2025-04-03 | 8.4 High |
root privileges via buffer overflow in ordist command on SGI IRIX systems. | ||||
CVE-1999-0018 | 3 Ibm, Sgi, Sun | 4 Aix, Irix, Solaris and 1 more | 2025-04-03 | N/A |
Buffer overflow in statd allows root privileges. | ||||
CVE-1999-0022 | 6 Bsdi, Freebsd, Hp and 3 more | 7 Bsd Os, Freebsd, Hp-ux and 4 more | 2025-04-03 | 7.8 High |
Local user gains root privileges via buffer overflow in rdist, via expstr() function. | ||||
CVE-1999-0025 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in df command on SGI IRIX systems. | ||||
CVE-1999-0026 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in pset command on SGI IRIX systems. | ||||
CVE-1999-0028 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | ||||
CVE-1999-0030 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in xlock command on SGI IRIX systems. | ||||
CVE-1999-0032 | 5 Bsdi, Freebsd, Next and 2 more | 5 Bsd Os, Freebsd, Nextstep and 2 more | 2025-04-03 | N/A |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. | ||||
CVE-1999-0033 | 5 Ibm, Ncr, Sco and 2 more | 7 Aix, Mp-ras, Open Desktop and 4 more | 2025-04-03 | N/A |
Command execution in Sun systems via buffer overflow in the at program. | ||||
CVE-1999-0034 | 4 Bsdi, Larry Wall, Redhat and 1 more | 4 Bsd Os, Perl, Linux and 1 more | 2025-04-03 | N/A |
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. | ||||
CVE-1999-0035 | 2 Gnu, Sgi | 2 Inet, Irix | 2025-04-03 | N/A |
Race condition in signal handling routine in ftpd, allowing read/write arbitrary files. | ||||
CVE-1999-0038 | 7 Bsdi, Data General, Debian and 4 more | 8 Bsd Os, Dg Ux, Debian Linux and 5 more | 2025-04-03 | 8.4 High |
Buffer overflow in xlock program allows local users to execute commands as root. | ||||
CVE-2023-6917 | 2 Redhat, Sgi | 2 Enterprise Linux, Performance Co-pilot | 2025-04-01 | 6 Medium |
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation. |