Show filters
35 Total Results
Displaying 21-30 of 35
Sort by:
Attacker Value
Unknown
CVE-1999-0036
Disclosure Date: May 26, 1997 (last updated February 22, 2025)
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.
0
Attacker Value
Unknown
CVE-1999-1410
Disclosure Date: May 09, 1997 (last updated February 22, 2025)
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.
0
Attacker Value
Unknown
CVE-1999-1398
Disclosure Date: May 07, 1997 (last updated February 22, 2025)
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
0
Attacker Value
Unknown
CVE-1999-0039
Disclosure Date: May 06, 1997 (last updated February 22, 2025)
webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter.
0
Attacker Value
Unknown
CVE-1999-0038
Disclosure Date: April 26, 1997 (last updated February 22, 2025)
Buffer overflow in xlock program allows local users to execute commands as root.
0
Attacker Value
Unknown
CVE-1999-0051
Disclosure Date: January 06, 1997 (last updated February 22, 2025)
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
0
Attacker Value
Unknown
CVE-1999-1401
Disclosure Date: December 05, 1996 (last updated February 22, 2025)
Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
0
Attacker Value
Unknown
CVE-1999-0044
Disclosure Date: December 03, 1996 (last updated February 22, 2025)
fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.
0
Attacker Value
Unknown
CVE-1999-1384
Disclosure Date: October 30, 1996 (last updated February 22, 2025)
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
0
Attacker Value
Unknown
CVE-1999-0032
Disclosure Date: October 25, 1996 (last updated February 22, 2025)
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
0