Vulnerabilities > SGI > Irix > 6.5.9
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2002-01-31 | CVE-2002-0038 | Unspecified vulnerability in SGI Irix Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 through 6.5.11 allows remote attackers to cause a denial of service by forcing the cache to fill the disk. | 5.0 |
2001-12-06 | CVE-2001-0801 | Unspecified vulnerability in SGI Irix lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. | 7.2 |
2001-12-06 | CVE-2001-0800 | Remote Command Execution vulnerability in IRIX 'lpsched' lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. | 10.0 |
2001-12-06 | CVE-2001-0799 | Remote Security vulnerability in IRIX Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. | 10.0 |
2001-12-06 | CVE-2001-0796 | Denial of Service vulnerability in SGI IRIX IGMP Multicast Packet SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay. | 5.0 |
2001-06-18 | CVE-2001-0249 | Incorrect Calculation of Buffer Size vulnerability in multiple products Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings. | 9.8 |
2000-01-08 | CVE-2000-1221 | The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. | 10.0 |
2000-01-08 | CVE-2000-1220 | The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. | 10.0 |