Filtered by vendor Sgi
Subscriptions
Filtered by product Irix
Subscriptions
Total
187 CVE
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-1999-0195 | 2 Linux, Sgi | 2 Linux Kernel, Irix | 2026-04-16 | N/A |
| Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. | ||||
| CVE-2000-0207 | 1 Sgi | 2 Infosearch, Irix | 2026-04-16 | N/A |
| SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters. | ||||
| CVE-1999-0215 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| Routed allows attackers to append data to files. | ||||
| CVE-1999-0328 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| SGI permissions program allows local users to gain root privileges. | ||||
| CVE-2000-0245 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts. | ||||
| CVE-1999-0413 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| A buffer overflow in the SGI X server allows local users to gain root access through the X server font path. | ||||
| CVE-1999-0461 | 2 Linux, Sgi | 2 Linux Kernel, Irix | 2026-04-16 | N/A |
| Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | ||||
| CVE-2004-1891 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| The ftp_syslog function in ftpd in SGI IRIX 6.5.20 "doesn't work with anonymous FTP," which has an unknown impact, possibly preventing the actions of anonymous users from being logged. | ||||
| CVE-1999-0524 | 11 Apple, Cisco, Hp and 8 more | 14 Mac Os X, Macos, Ios and 11 more | 2026-04-16 | N/A |
| ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts. | ||||
| CVE-2000-0798 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files. | ||||
| CVE-2000-1220 | 2 Redhat, Sgi | 2 Linux, Irix | 2026-04-16 | N/A |
| The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. | ||||
| CVE-1999-0028 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | ||||
| CVE-1999-0083 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| getcwd() file descriptor leak in FTP. | ||||
| CVE-1999-0765 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor. | ||||
| CVE-1999-0948 | 3 Sgi, Sun, Turbolinux | 4 Irix, Solaris, Sunos and 1 more | 2026-04-16 | N/A |
| Buffer overflow in uum program for Canna input system allows local users to gain root privileges. | ||||
| CVE-2000-0893 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system. | ||||
| CVE-1999-1120 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. | ||||
| CVE-1999-1181 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| Vulnerability in On-Line Customer Registration software for IRIX 6.2 through 6.4 allows local users to gain root privileges. | ||||
| CVE-1999-1232 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program. | ||||
| CVE-1999-1399 | 1 Sgi | 1 Irix | 2026-04-16 | N/A |
| spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed. | ||||