Vulnerabilities (CVE)

Filtered by vendor Sgi Subscribe
Filtered by product Irix
Total 187 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2002-1584 2 Sgi, Sun 3 Irix, Solaris, Sunos 2025-04-03 10.0 HIGH N/A
Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote attackers to gain privileges.
CVE-2002-0039 1 Sgi 1 Irix 2025-04-03 5.0 MEDIUM N/A
rpcbind in SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via malformed RPC packets with invalid lengths.
CVE-1999-0040 7 Bsdi, Freebsd, Hp and 4 more 10 Bsd Os, Freebsd, Hp-ux and 7 more 2025-04-03 7.2 HIGH N/A
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
CVE-1999-1398 1 Sgi 1 Irix 2025-04-03 6.2 MEDIUM N/A
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
CVE-2002-0652 1 Sgi 1 Irix 2025-04-03 7.5 HIGH N/A
xfsmd for IRIX 6.5 through 6.5.16 allows remote attackers to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs().
CVE-1999-0948 3 Sgi, Sun, Turbolinux 4 Irix, Solaris, Sunos and 1 more 2025-04-03 7.2 HIGH N/A
Buffer overflow in uum program for Canna input system allows local users to gain root privileges.
CVE-1999-1120 1 Sgi 1 Irix 2025-04-03 4.6 MEDIUM N/A
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
CVE-1999-1286 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file.
CVE-2004-0135 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
CVE-1999-0959 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
CVE-2000-0013 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
IRIX soundplayer program allows local users to gain privileges by including shell metacharacters in a .wav file, which is executed via the midikeys program.
CVE-1999-0033 5 Ibm, Ncr, Sco and 2 more 7 Aix, Mp-ras, Open Desktop and 4 more 2025-04-03 7.2 HIGH N/A
Command execution in Sun systems via buffer overflow in the at program.
CVE-2003-0176 1 Sgi 1 Irix 2025-04-03 5.0 MEDIUM N/A
The Name Service Daemon (nsd), when running on an NIS master on SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via a UDP port scan.
CVE-2003-0175 1 Sgi 1 Irix 2025-04-03 2.1 LOW N/A
SGI IRIX before 6.5.21 allows local users to cause a denial of service (kernel panic) via a certain call to the PIOCSWATCH ioctl.
CVE-1999-1039 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
Vulnerability in (1) diskalign and (2) diskperf in IRIX 6.4 patches 2291 and 2848 allow a local user to create root-owned files leading to a root compromise.
CVE-1999-0027 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
root privileges via buffer overflow in eject command on SGI IRIX systems.
CVE-1999-1040 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
Vulnerabilities in (1) ipxchk and (2) ipxlink in NetWare Client 1.0 on IRIX 6.3 and 6.4 allows local users to gain root access via a modified IFS environmental variable.
CVE-2002-0042 1 Sgi 1 Irix 2025-04-03 2.1 LOW N/A
Vulnerability in the XFS file system for SGI IRIX before 6.5.12 allows local users to cause a denial of service (hang) by creating a file that is not properly processed by XFS.
CVE-1999-0030 1 Sgi 1 Irix 2025-04-03 7.2 HIGH N/A
root privileges via buffer overflow in xlock command on SGI IRIX systems.
CVE-2000-1220 2 Redhat, Sgi 2 Linux, Irix 2025-04-03 10.0 HIGH N/A
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.