Vulnerabilities > SGI > Irix > 5.0
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-05-02 | CVE-2005-0465 | Unspecified vulnerability in SGI Irix gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option. | 2.1 |
2004-08-18 | CVE-2004-0134 | Privilege Escalation vulnerability in IRIX Checkpoint and Restart libcpr Library Loading cpr (libcpr) in SGI IRIX before 6.5.25 allows local users to gain privileges by loading a user provided library while restarting the checkpointed process. | 7.2 |
2004-08-06 | CVE-2004-0135 | Unspecified vulnerability in SGI Irix The syssgi SGI_IOPROBE system call in IRIX 6.5.20 through 6.5.24 allows local users to gain privileges by reading and writing to kernel memory. | 7.2 |
2003-03-03 | CVE-2003-0064 | The dtterm terminal emulator allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. | 7.5 |
2002-05-16 | CVE-2002-0173 | Buffer Overflow vulnerability in SGI IRIX CPR Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges. | 7.2 |
1998-04-08 | CVE-1999-1114 | Unspecified vulnerability in SGI Irix Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges. | 7.2 |
1998-04-08 | CVE-1999-0009 | Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. | 10.0 |
1997-12-05 | CVE-1999-0018 | Buffer overflow in statd allows root privileges. | 10.0 |
1997-05-09 | CVE-1999-1410 | Unspecified vulnerability in SGI Irix addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. | 6.2 |
1997-05-07 | CVE-1999-1398 | Unspecified vulnerability in SGI Irix Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. | 6.2 |