Vulnerabilities > SGI > Irix > 5.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1997-05-09 | CVE-1999-1410 | Unspecified vulnerability in SGI Irix addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. | 6.2 |
1997-05-09 | CVE-1999-1286 | Unspecified vulnerability in SGI Irix addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. | 7.2 |
1997-05-07 | CVE-1999-1398 | Unspecified vulnerability in SGI Irix Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. | 6.2 |
1997-05-06 | CVE-1999-0039 | Unspecified vulnerability in SGI Irix webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. | 7.5 |
1997-04-26 | CVE-1999-0038 | Buffer overflow in xlock program allows local users to execute commands as root. | 7.2 |
1997-01-06 | CVE-1999-0051 | Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. | 7.2 |
1997-01-04 | CVE-1999-1120 | Unspecified vulnerability in SGI Irix netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges. | 4.6 |
1996-12-05 | CVE-1999-1401 | Unspecified vulnerability in SGI Irix Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook). | 4.6 |
1996-12-03 | CVE-1999-0044 | Unspecified vulnerability in SGI Irix fsdump command in IRIX allows local users to obtain root access by modifying sensitive files. | 7.2 |
1996-10-30 | CVE-1999-1384 | Unspecified vulnerability in SGI Irix Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program. | 7.2 |