Total
185 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2003-0797 | 1 Sgi | 1 Irix | 2017-07-10 | 5.0 MEDIUM | N/A |
Unknown vulnerability in rpc.mountd in SGI IRIX 6.5 through 6.5.22 allows remote attackers to cause a denial of service (process death) via unknown attack vectors. | |||||
CVE-2003-0796 | 1 Sgi | 1 Irix | 2017-07-10 | 7.5 HIGH | N/A |
Unknown vulnerability in rpc.mountd SGI IRIX 6.5.18 through 6.5.22 allows remote attackers to mount from unprivileged ports even with the -n option disabled. | |||||
CVE-2003-0174 | 1 Sgi | 1 Irix | 2017-07-10 | 7.5 HIGH | N/A |
The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password. | |||||
CVE-2003-0575 | 1 Sgi | 1 Irix | 2017-07-10 | 10.0 HIGH | N/A |
Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list. | |||||
CVE-2004-0139 | 1 Sgi | 1 Irix | 2017-07-10 | 10.0 HIGH | N/A |
Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 through 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors. | |||||
CVE-2002-0652 | 1 Sgi | 1 Irix | 2016-10-17 | 7.5 HIGH | N/A |
xfsmd for IRIX 6.5 through 6.5.16 allows remote attackers to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs(). | |||||
CVE-2002-0359 | 1 Sgi | 1 Irix | 2016-10-17 | 10.0 HIGH | N/A |
xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges. | |||||
CVE-2002-0213 | 2 Sgi, Xinet | 2 Irix, K-ashare | 2016-10-17 | 2.1 LOW | N/A |
xkas in Xinet K-AShare 0.011.01 for IRIX allows local users to read arbitrary files via a symlink attack on the VOLICON file, which is copied to the .HSicon file in a shared directory. | |||||
CVE-1999-1501 | 1 Sgi | 1 Irix | 2016-10-17 | 4.6 MEDIUM | N/A |
(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands. | |||||
CVE-1999-1399 | 1 Sgi | 1 Irix | 2016-10-17 | 7.2 HIGH | N/A |
spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed. | |||||
CVE-1999-1398 | 1 Sgi | 1 Irix | 2016-10-17 | 6.2 MEDIUM | N/A |
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. | |||||
CVE-1999-1409 | 2 Netbsd, Sgi | 2 Netbsd, Irix | 2016-10-17 | 2.1 LOW | N/A |
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. | |||||
CVE-1999-1410 | 1 Sgi | 1 Irix | 2016-10-17 | 6.2 MEDIUM | N/A |
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. | |||||
CVE-1999-1461 | 1 Sgi | 1 Irix | 2016-10-17 | 7.2 HIGH | N/A |
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. | |||||
CVE-1999-1384 | 1 Sgi | 1 Irix | 2016-10-17 | 7.2 HIGH | N/A |
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. | |||||
CVE-1999-1040 | 1 Sgi | 1 Irix | 2016-10-17 | 7.2 HIGH | N/A |
Vulnerabilities in (1) ipxchk and (2) ipxlink in NetWare Client 1.0 on IRIX 6.3 and 6.4 allows local users to gain root access via a modified IFS environmental variable. | |||||
CVE-1999-1067 | 1 Sgi | 1 Irix | 2016-10-17 | 5.0 MEDIUM | N/A |
SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities. | |||||
CVE-2005-0139 | 1 Sgi | 1 Irix | 2016-05-09 | 7.5 HIGH | N/A |
Unknown vulnerability in rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not sufficiently restrict access rights for read-mostly exports, which allows attackers to conduct unauthorized activities. | |||||
CVE-2005-0138 | 1 Sgi | 1 Irix | 2016-05-09 | 7.5 HIGH | N/A |
rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not correctly allow access to anonymous clients that connect from a system whose hostname can not be determined. NOTE: while this issue occurs in a security mechanism, there is no apparent attacker role and probably does not satisfy the CVE definition of a vulnerability. | |||||
CVE-1999-1183 | 1 Sgi | 1 Irix | 2013-08-20 | 7.6 HIGH | N/A |
System Manager sysmgr GUI in SGI IRIX 6.4 and 6.3 allows remote attackers to execute commands by providing a trojan horse (1) runtask or (2) runexec descriptor file, which is used to execute a System Manager Task when the user's Mailcap entry supports the x-sgi-task or x-sgi-exec type. |