Filtered by vendor Sgi
Subscriptions
Total
259 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-1999-0059 | 1 Sgi | 1 Irix | 2025-04-03 | 7.3 High |
IRIX fam service allows an attacker to obtain a list of all files on the server. | ||||
CVE-1999-0073 | 2 Digital, Sgi | 3 Osf 1, Unix, Irix | 2025-04-03 | N/A |
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. | ||||
CVE-1999-0270 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. | ||||
CVE-1999-1066 | 1 Sgi | 1 Quake 1 Server | 2025-04-03 | N/A |
Quake 1 server responds to an initial UDP game connection request with a large amount of traffic, which allows remote attackers to use the server as an amplifier in a "Smurf" style attack on another host, by spoofing the connection request. | ||||
CVE-2001-0485 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option. | ||||
CVE-2005-3626 | 18 Conectiva, Debian, Easy Software Products and 15 more | 33 Linux, Debian Linux, Cups and 30 more | 2025-04-03 | N/A |
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference. | ||||
CVE-1999-0009 | 11 Bsdi, Caldera, Data General and 8 more | 13 Bsd Os, Openlinux, Dg Ux and 10 more | 2025-04-03 | N/A |
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. | ||||
CVE-1999-0018 | 3 Ibm, Sgi, Sun | 4 Aix, Irix, Solaris and 1 more | 2025-04-03 | N/A |
Buffer overflow in statd allows root privileges. | ||||
CVE-1999-0022 | 6 Bsdi, Freebsd, Hp and 3 more | 7 Bsd Os, Freebsd, Hp-ux and 4 more | 2025-04-03 | 7.8 High |
Local user gains root privileges via buffer overflow in rdist, via expstr() function. | ||||
CVE-1999-0025 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in df command on SGI IRIX systems. | ||||
CVE-1999-0026 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in pset command on SGI IRIX systems. | ||||
CVE-1999-0027 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in eject command on SGI IRIX systems. | ||||
CVE-1999-0028 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | ||||
CVE-1999-0030 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
root privileges via buffer overflow in xlock command on SGI IRIX systems. | ||||
CVE-1999-0032 | 5 Bsdi, Freebsd, Next and 2 more | 5 Bsd Os, Freebsd, Nextstep and 2 more | 2025-04-03 | N/A |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. | ||||
CVE-1999-0033 | 5 Ibm, Ncr, Sco and 2 more | 7 Aix, Mp-ras, Open Desktop and 4 more | 2025-04-03 | N/A |
Command execution in Sun systems via buffer overflow in the at program. | ||||
CVE-1999-0034 | 4 Bsdi, Larry Wall, Redhat and 1 more | 4 Bsd Os, Perl, Linux and 1 more | 2025-04-03 | N/A |
Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. | ||||
CVE-1999-0003 | 5 Hp, Ibm, Sgi and 2 more | 6 Hp-ux, Aix, Irix and 3 more | 2025-04-03 | N/A |
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). | ||||
CVE-1999-0036 | 1 Sgi | 1 Irix | 2025-04-03 | 8.4 High |
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. | ||||
CVE-1999-0078 | 10 Bsdi, Freebsd, Hp and 7 more | 11 Bsd Os, Freebsd, Hp-ux and 8 more | 2025-04-03 | N/A |
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. |