Sgi

Irix

182 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.38%
  • Published 16.07.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

root privileges via buffer overflow in ordist command on SGI IRIX systems.

  • EPSS 0.27%
  • Published 16.07.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

root privileges via buffer overflow in xlock command on SGI IRIX systems.

  • EPSS 0.72%
  • Published 14.07.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

IRIX fam service allows an attacker to obtain a list of all files on the server.

  • EPSS 0.14%
  • Published 01.07.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.

  • EPSS 0.14%
  • Published 12.06.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

Command execution in Sun systems via buffer overflow in the at program.

  • EPSS 0.68%
  • Published 11.06.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

getcwd() file descriptor leak in FTP.

  • EPSS 0.55%
  • Published 29.05.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

Race condition in signal handling routine in ftpd, allowing read/write arbitrary files.

  • EPSS 0.05%
  • Published 28.05.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs.

  • EPSS 0.83%
  • Published 26.05.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.

  • EPSS 0.1%
  • Published 16.05.1997 04:00:00
  • Last modified 03.04.2025 01:03:51

Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program.