Search Results (187 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-0959 1 Sgi 1 Irix 2026-04-16 N/A
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
CVE-1999-0032 5 Bsdi, Freebsd, Next and 2 more 5 Bsd Os, Freebsd, Nextstep and 2 more 2026-04-16 N/A
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
CVE-1999-1067 1 Sgi 1 Irix 2026-04-16 N/A
SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities.
CVE-1999-0215 1 Sgi 1 Irix 2026-04-16 N/A
Routed allows attackers to append data to files.
CVE-1999-0241 3 Sgi, Sun, Xfree86 Project 4 Irix, Solaris, Sunos and 1 more 2026-04-16 N/A
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.
CVE-1999-1102 4 Apple, Bsd, Sgi and 1 more 4 A Ux, Bsd, Irix and 1 more 2026-04-16 N/A
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times.
CVE-1999-1120 1 Sgi 1 Irix 2026-04-16 N/A
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
CVE-1999-0327 1 Sgi 1 Irix 2026-04-16 N/A
SGI syserr program allows local users to corrupt files.
CVE-1999-1384 1 Sgi 1 Irix 2026-04-16 N/A
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
CVE-1999-1398 1 Sgi 1 Irix 2026-04-16 N/A
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
CVE-1999-1409 2 Netbsd, Sgi 2 Netbsd, Irix 2026-04-16 N/A
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
CVE-1999-1410 1 Sgi 1 Irix 2026-04-16 N/A
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.
CVE-1999-1461 1 Sgi 1 Irix 2026-04-16 N/A
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program.
CVE-1999-0125 3 Redhat, Sgi, Sun 4 Linux, Irix, Solaris and 1 more 2026-04-16 N/A
Buffer overflow in SGI IRIX mailx program.
CVE-2003-0175 1 Sgi 1 Irix 2026-04-16 N/A
SGI IRIX before 6.5.21 allows local users to cause a denial of service (kernel panic) via a certain call to the PIOCSWATCH ioctl.
CVE-2003-0688 6 Compaq, Freebsd, Openbsd and 3 more 7 Tru64, Freebsd, Openbsd and 4 more 2026-04-16 N/A
The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.
CVE-2000-0207 1 Sgi 2 Infosearch, Irix 2026-04-16 N/A
SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters.
CVE-2000-0245 1 Sgi 1 Irix 2026-04-16 N/A
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
CVE-2000-0797 1 Sgi 1 Irix 2026-04-16 N/A
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option.
CVE-2000-1221 3 Debian, Redhat, Sgi 3 Debian Linux, Linux, Irix 2026-04-16 N/A
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.