Filtered by vendor Sgi
Subscriptions
Total
259 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2003-0174 | 1 Sgi | 1 Irix | 2025-04-03 | 9.8 Critical |
| The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password. | ||||
| CVE-2004-0081 | 23 4d, Apple, Avaya and 20 more | 67 Webstar, Mac Os X, Mac Os X Server and 64 more | 2025-04-03 | N/A |
| OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool. | ||||
| CVE-2004-1307 | 11 Apple, Avaya, Conectiva and 8 more | 20 Mac Os X, Mac Os X Server, Call Management System Server and 17 more | 2025-04-03 | N/A |
| Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execute arbitrary code via a TIFF file with the STRIPOFFSETS flag and a large number of strips, which causes a zero byte buffer to be allocated and leads to a heap-based buffer overflow. | ||||
| CVE-1999-0003 | 5 Hp, Ibm, Sgi and 2 more | 6 Hp-ux, Aix, Irix and 3 more | 2025-04-03 | N/A |
| Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). | ||||
| CVE-2005-0206 | 15 Ascii, Cstex, Debian and 12 more | 22 Ptex, Cstetex, Debian Linux and 19 more | 2025-04-03 | N/A |
| The patch for integer overflow vulnerabilities in Xpdf 2.0 and 3.0 (CVE-2004-0888) is incomplete for 64-bit architectures on certain Linux distributions such as Red Hat, which could leave Xpdf users exposed to the original vulnerabilities. | ||||
| CVE-1999-0025 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| root privileges via buffer overflow in df command on SGI IRIX systems. | ||||
| CVE-1999-0026 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| root privileges via buffer overflow in pset command on SGI IRIX systems. | ||||
| CVE-1999-0027 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| root privileges via buffer overflow in eject command on SGI IRIX systems. | ||||
| CVE-1999-0040 | 7 Bsdi, Freebsd, Hp and 4 more | 10 Bsd Os, Freebsd, Hp-ux and 7 more | 2025-04-03 | N/A |
| Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. | ||||
| CVE-1999-0044 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| fsdump command in IRIX allows local users to obtain root access by modifying sensitive files. | ||||
| CVE-1999-0049 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| Csetup under IRIX allows arbitrary file creation or overwriting. | ||||
| CVE-1999-0215 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| Routed allows attackers to append data to files. | ||||
| CVE-1999-0234 | 5 Caldera, Redhat, Sgi and 2 more | 5 Openlinux, Linux, Irix and 2 more | 2025-04-03 | N/A |
| Bash treats any character with a value of 255 as a command separator. | ||||
| CVE-1999-0413 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| A buffer overflow in the SGI X server allows local users to gain root access through the X server font path. | ||||
| CVE-1999-0461 | 2 Linux, Sgi | 2 Linux Kernel, Irix | 2025-04-03 | N/A |
| Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | ||||
| CVE-1999-0765 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor. | ||||
| CVE-1999-0948 | 3 Sgi, Sun, Turbolinux | 4 Irix, Solaris, Sunos and 1 more | 2025-04-03 | N/A |
| Buffer overflow in uum program for Canna input system allows local users to gain root privileges. | ||||
| CVE-1999-0949 | 3 Sgi, Sun, Turbolinux | 4 Irix, Solaris, Sunos and 1 more | 2025-04-03 | N/A |
| Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. | ||||
| CVE-1999-0960 | 1 Sgi | 1 Irix | 2025-04-03 | N/A |
| IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option. | ||||