Filtered by vendor Sgi
Subscriptions
Total
259 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-1066 | 1 Sgi | 1 Quake 1 Server | 2025-04-03 | N/A |
Quake 1 server responds to an initial UDP game connection request with a large amount of traffic, which allows remote attackers to use the server as an amplifier in a "Smurf" style attack on another host, by spoofing the connection request. | ||||
CVE-1999-1116 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Vulnerability in runpriv in Indigo Magic System Administration subsystem of SGI IRIX 6.3 and 6.4 allows local users to gain root privileges. | ||||
CVE-2005-0605 | 8 Altlinux, Lesstif, Mandrakesoft and 5 more | 12 Alt Linux, Lesstif, Mandrake Linux and 9 more | 2025-04-03 | N/A |
scan.c for LibXPM may allow attackers to execute arbitrary code via a negative bitmap_unit value that leads to a buffer overflow. | ||||
CVE-2001-0485 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option. | ||||
CVE-2001-0797 | 5 Hp, Ibm, Sco and 2 more | 6 Hp-ux, Aix, Openserver and 3 more | 2025-04-03 | N/A |
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. | ||||
CVE-2001-0891 | 2 Cray, Sgi | 2 Unicos, Nqsdaemon | 2025-04-03 | N/A |
Format string vulnerability in NQS daemon (nqsdaemon) in NQE 3.3.0.16 for CRAY UNICOS and SGI IRIX allows a local user to gain root privileges by using qsub to submit a batch job whose name contains formatting characters. | ||||
CVE-2004-0148 | 3 Redhat, Sgi, Washington University | 3 Enterprise Linux, Propack, Wu-ftpd | 2025-04-03 | N/A |
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead. | ||||
CVE-1999-0009 | 11 Bsdi, Caldera, Data General and 8 more | 13 Bsd Os, Openlinux, Dg Ux and 10 more | 2025-04-03 | N/A |
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. | ||||
CVE-1999-0018 | 3 Ibm, Sgi, Sun | 4 Aix, Irix, Solaris and 1 more | 2025-04-03 | N/A |
Buffer overflow in statd allows root privileges. | ||||
CVE-1999-0022 | 6 Bsdi, Freebsd, Hp and 3 more | 7 Bsd Os, Freebsd, Hp-ux and 4 more | 2025-04-03 | 7.8 High |
Local user gains root privileges via buffer overflow in rdist, via expstr() function. | ||||
CVE-1999-0025 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in df command on SGI IRIX systems. | ||||
CVE-1999-0026 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in pset command on SGI IRIX systems. | ||||
CVE-1999-0027 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in eject command on SGI IRIX systems. | ||||
CVE-1999-0028 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | ||||
CVE-1999-0030 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in xlock command on SGI IRIX systems. | ||||
CVE-1999-0032 | 5 Bsdi, Freebsd, Next and 2 more | 5 Bsd Os, Freebsd, Nextstep and 2 more | 2025-04-03 | N/A |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. | ||||
CVE-1999-0033 | 5 Ibm, Ncr, Sco and 2 more | 7 Aix, Mp-ras, Open Desktop and 4 more | 2025-04-03 | N/A |
Command execution in Sun systems via buffer overflow in the at program. | ||||
CVE-1999-0034 | 4 Bsdi, Larry Wall, Redhat and 1 more | 4 Bsd Os, Perl, Linux and 1 more | 2025-04-03 | N/A |
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. | ||||
CVE-2023-6917 | 2 Redhat, Sgi | 2 Enterprise Linux, Performance Co-pilot | 2025-04-01 | 6 Medium |
A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation. |