CVE-2001-0799
https://notcve.org/view.php?id=CVE-2001-0799
Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpsched2 http://www.osvdb.org/8572 https://exchange.xforce.ibmcloud.com/vulnerabilities/7641 •
CVE-2001-1456
https://notcve.org/view.php?id=CVE-2001-1456
Buffer overflow in the (1) smap/smapd and (2) CSMAP daemons for Gauntlet Firewall 5.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted mail message. • ftp://patches.sgi.com/support/free/security/advisories/20011104-01-I http://www.cert.org/advisories/CA-2001-25.html http://www.kb.cert.org/vuls/id/206723 http://www.securityfocus.com/bid/3290 https://exchange.xforce.ibmcloud.com/vulnerabilities/7088 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2000-1193 – IRIX 6.5.x - Performance Co-Pilot Remote Denial of Service
https://notcve.org/view.php?id=CVE-2000-1193
Performance Metrics Collector Daemon (PMCD) in Performance Copilot in IRIX 6.x allows remote attackers to cause a denial of service (resource exhaustion) via an extremely long string to the PMCD port. • https://www.exploit-db.com/exploits/21431 ftp://patches.sgi.com/support/free/security/advisories/20020407-01-I http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html https://exchange.xforce.ibmcloud.com/vulnerabilities/4284 •
CVE-2001-0554 – Solaris 2.x/7.0/8 / IRIX 6.5.x / OpenBSD 2.x / NetBSD 1.x / Debian 3 / HP-UX 10 - 'TelnetD' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. • https://www.exploit-db.com/exploits/21018 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt http://archives.neohapsis.com/archives/hp/2001-q4/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2001-0331
https://notcve.org/view.php?id=CVE-2001-0331
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P http://www.kb.cert.org/vuls/id/258632 http://www.osvdb.org/1822 http://www.securityfocus.com/bid/2714 http://xforce.iss.net/alerts/advise76.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6502 •