CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
02h00 +00:00 |
eEye Audit ID 2499 in eEye Digital Security Audits 2406 through 2423 for eEye Retina Network Security Scanner on HP-UX, IRIX, and Solaris allows local users to gain privileges via a Trojan horse gauntlet program in an arbitrary directory under /usr/local/. | 6.9 |
||
18h00 +00:00 |
Multiple cross-site request forgery (CSRF) vulnerabilities in the web management interface in InterSect Alliance Snare Agent 3.2.3 and earlier on Solaris, Snare Agent 3.1.7 and earlier on Windows, Snare Agent 1.5.0 and earlier on Linux and AIX, Snare Agent 1.4 and earlier on IRIX, Snare Epilog 1.5.3 and earlier on Windows, and Snare Epilog 1.2 and earlier on UNIX allow remote attackers to hijack the authentication of administrators for requests that (1) change the password or (2) change the listening port. | 6.8 |
||
17h00 +00:00 |
Heap-based buffer overflow in libmpdemux/aviheader.c in MPlayer 1.0rc1 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a .avi file with certain large "indx truck size" and nEntriesInuse values, and a certain wLongsPerEntry value. | 7.6 |
||
02h00 +00:00 |
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. | 7.5 |
||
02h00 +00:00 |
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option. | 2.1 |
||
02h00 +00:00 |
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option. | 7.2 |
||
02h00 +00:00 |
Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges attacker to execute arbitrary commands via the -n option. | 7.2 |
||
02h00 +00:00 |
The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. | 7.5 |
||
02h00 +00:00 |
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory. | 7.2 |
||
02h00 +00:00 |
cpr (libcpr) in SGI IRIX before 6.5.25 allows local users to gain privileges by loading a user provided library while restarting the checkpointed process. | 7.2 |
||
04h00 +00:00 |
Unknown vulnerability in the libcpr library for the Checkpoint/Restart (cpr) system on SGI IRIX 6.5.21f and earlier allows local users to truncate or overwrite certain files. | 2.1 |
||
02h00 +00:00 |
The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password. | 9.8 |
Critical |
|
03h00 +00:00 |
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges. | 7.2 |
||
03h00 +00:00 |
xfsmd for IRIX 6.5 through 6.5.16 uses weak authentication, which allows remote attackers to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges. | 10 |
||
03h00 +00:00 |
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure. | 7.2 |
||
02h00 +00:00 |
CDE ToolTalk database server (ttdbserver) allows remote attackers to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure. | 7.5 |
||
04h00 +00:00 |
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges. | 7.2 |
||
04h00 +00:00 |
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. | 4.6 |
||
04h00 +00:00 |
Buffer overflow in OSF Distributed Computing Environment (DCE) security demon (secd) in IRIX 6.4 and earlier allows attackers to cause a denial of service via a long principal, group, or organization. | 5 |
||
04h00 +00:00 |
Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. | 7.2 |
||
04h00 +00:00 |
Vulnerability in On-Line Customer Registration software for IRIX 6.2 through 6.4 allows local users to gain root privileges. | 7.2 |
||
04h00 +00:00 |
The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID. | 2.1 |
||
04h00 +00:00 |
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. | 7.2 |
||
04h00 +00:00 |
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. | 2.1 |
||
04h00 +00:00 |
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in dmplay in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long command line option. | 7.2 |
||
04h00 +00:00 |
SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay. | 5 |
||
04h00 +00:00 |
lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. | 7.2 |
||
04h00 +00:00 |
Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. | 10 |
||
04h00 +00:00 |
lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. | 10 |
||
02h00 +00:00 |
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. | 7.5 |
||
02h00 +00:00 |
Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program. | 7.2 |
||
02h00 +00:00 |
Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges. | 7.2 |
||
02h00 +00:00 |
addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. | 7.2 |
||
02h00 +00:00 |
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. | 6.2 |
||
02h00 +00:00 |
spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed. | 7.2 |
||
02h00 +00:00 |
Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook). | 4.6 |
||
02h00 +00:00 |
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. | 6.2 |
||
02h00 +00:00 |
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. | 7.2 |
||
04h00 +00:00 |
The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system. | 5 |
||
04h00 +00:00 |
The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon. | 6.4 |
||
04h00 +00:00 |
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. | 10 |
||
02h00 +00:00 |
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. | 10 |
||
02h00 +00:00 |
Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview. | 7.2 |
||
02h00 +00:00 |
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files. | 10 |
||
02h00 +00:00 |
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack. | 7.2 |
||
02h00 +00:00 |
IRIX soundplayer program allows local users to gain privileges by including shell metacharacters in a .wav file, which is executed via the midikeys program. | 7.2 |
||
02h00 +00:00 |
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts. | 10 |
||
04h00 +00:00 |
root privileges via buffer overflow in xlock command on SGI IRIX systems. | 7.2 |
||
04h00 +00:00 |
Command execution in Sun systems via buffer overflow in the at program. | 7.2 |
||
04h00 +00:00 |
Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. | 5 |
||
04h00 +00:00 |
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. | 10 |
||
04h00 +00:00 |
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address. | 10 |
||
04h00 +00:00 |
Buffer overflow in uum program for Canna input system allows local users to gain root privileges. | 7.2 |
||
04h00 +00:00 |
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. | 7.2 |
||
04h00 +00:00 |
Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. | 5 |
||
04h00 +00:00 |
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges. | 10 |
||
04h00 +00:00 |
IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option. | 7.2 |
||
02h00 +00:00 |
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). | 10 |
||
02h00 +00:00 |
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. | 10 |
||
02h00 +00:00 |
Local user gains root privileges via buffer overflow in rdist, via expstr() function. | 7.8 |
High |
|
02h00 +00:00 |
root privileges via buffer overflow in df command on SGI IRIX systems. | 7.2 |
||
02h00 +00:00 |
root privileges via buffer overflow in pset command on SGI IRIX systems. | 4.6 |
||
02h00 +00:00 |
root privileges via buffer overflow in eject command on SGI IRIX systems. | 7.2 |
||
02h00 +00:00 |
root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | 7.2 |
||
02h00 +00:00 |
root privileges via buffer overflow in ordist command on SGI IRIX systems. | 8.4 |
High |
|
02h00 +00:00 |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. | 7.2 |
||
02h00 +00:00 |
Race condition in signal handling routine in ftpd, allowing read/write arbitrary files. | 5.1 |
||
02h00 +00:00 |
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. | 8.4 |
High |
|
02h00 +00:00 |
webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. | 7.3 |
High |
|
02h00 +00:00 |
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. | 7.2 |
||
02h00 +00:00 |
fsdump command in IRIX allows local users to obtain root access by modifying sensitive files. | 7.2 |
||
02h00 +00:00 |
Csetup under IRIX allows arbitrary file creation or overwriting. | 7.2 |
||
02h00 +00:00 |
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. | 7.2 |
||
02h00 +00:00 |
IRIX fam service allows an attacker to obtain a list of all files on the server. | 7.3 |
High |
|
02h00 +00:00 |
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. | 10 |
||
02h00 +00:00 |
getcwd() file descriptor leak in FTP. | 5 |
||
02h00 +00:00 |
The printers program in IRIX has a buffer overflow that gives root access to local users. | 7.2 |
||
02h00 +00:00 |
The handler CGI program in IRIX allows arbitrary command execution. | 7.5 |
||
02h00 +00:00 |
The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack. | 7.5 |
||
02h00 +00:00 |
Routed allows attackers to append data to files. | 6.4 |
||
02h00 +00:00 |
Bash treats any character with a value of 255 as a command separator. | 4.6 |
||
02h00 +00:00 |
SGI syserr program allows local users to corrupt files. | 2.1 |
||
02h00 +00:00 |
SGI permissions program allows local users to gain root privileges. | 7.2 |
||
02h00 +00:00 |
SGI mediad program allows local users to gain root access. | 7.2 |
||
02h00 +00:00 |
A buffer overflow in the SGI X server allows local users to gain root access through the X server font path. | 7.2 |