Sgi

Irix

182 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Published 01.02.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.

  • EPSS 0.07%
  • Published 08.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

Csetup under IRIX allows arbitrary file creation or overwriting.

  • EPSS 0.25%
  • Published 06.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.

Exploit
  • EPSS 0.37%
  • Published 04.01.1997 05:00:00
  • Last modified 03.04.2025 01:03:51

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.

  • EPSS 0.06%
  • Published 05.12.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook).

  • EPSS 0.23%
  • Published 03.12.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.

Exploit
  • EPSS 0.21%
  • Published 30.10.1996 05:00:00
  • Last modified 03.04.2025 01:03:51

Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour pr...

  • EPSS 0.2%
  • Published 25.10.1996 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.

  • EPSS 0.08%
  • Published 08.10.1996 04:00:00
  • Last modified 03.04.2025 01:03:51

Bash treats any character with a value of 255 as a command separator.

  • EPSS 0.25%
  • Published 03.07.1996 04:00:00
  • Last modified 03.04.2025 01:03:51

Local user gains root privileges via buffer overflow in rdist, via expstr() function.