CVE-2002-0038
https://notcve.org/view.php?id=CVE-2002-0038
Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 through 6.5.11 allows remote attackers to cause a denial of service by forcing the cache to fill the disk. Vulnerabilidad en la función limitadora de cache en el demonio nsd de IRIX 6.5.4 hasta la 6.5.11 permite que atacantes remotos causen una denegación de servicio forzando que la caché ocupe todo el disco. • ftp://patches.sgi.com/support/free/security/advisories/20020102-01-I ftp://patches.sgi.com/support/free/security/advisories/20020102-02-I ftp://patches.sgi.com/support/free/security/advisories/20020102-03-P http://www.securityfocus.com/bid/3882 https://exchange.xforce.ibmcloud.com/vulnerabilities/7907 •
CVE-2001-0891
https://notcve.org/view.php?id=CVE-2001-0891
Format string vulnerability in NQS daemon (nqsdaemon) in NQE 3.3.0.16 for CRAY UNICOS and SGI IRIX allows a local user to gain root privileges by using qsub to submit a batch job whose name contains formatting characters. Vulnerabilidad en el formateado de cadenas en el demonio NQS (nqsdaemon) en NQE 3.3.0.16 para CRAY UNICOS permite que un usuario local obtenga privilegios de root usando qsub para enviar un proceso job cuyo nombre contiene caracteres de formatado. • ftp://patches.sgi.com/support/free/security/advisories/20020101-01-I http://marc.info/?l=bugtraq&m=100695627423924&w=2 http://www.osvdb.org/3275 http://www.securityfocus.com/bid/3590 https://exchange.xforce.ibmcloud.com/vulnerabilities/7618 •
CVE-2001-0797 – System V Derived /bin/login - Extraneous Arguments Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •
CVE-2001-0823 – SGI Performance Co-Pilot 2.1.x/2.2 - pmpost Symbolic Link
https://notcve.org/view.php?id=CVE-2001-0823
The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR). • https://www.exploit-db.com/exploits/20937 ftp://patches.sgi.com/support/free/security/advisories/20010601-01-A http://archives.neohapsis.com/archives/bugtraq/2001-06/0245.html http://marc.info/?l=bugtraq&m=99290754901708&w=2 http://www.securityfocus.com/bid/2887 https://exchange.xforce.ibmcloud.com/vulnerabilities/6724 •
CVE-2001-0801
https://notcve.org/view.php?id=CVE-2001-0801
lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpstat2 https://exchange.xforce.ibmcloud.com/vulnerabilities/7639 •