CVE-2001-0800 – Irix LPD tagprinter - Command Execution
https://notcve.org/view.php?id=CVE-2001-0800
lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/10033 ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpsched2 http://www.securityfocus.com/bid/27566 - •
CVE-2001-0799
https://notcve.org/view.php?id=CVE-2001-0799
Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P http://www.lsd-pl.net/files/get?IRIX/irx_lpsched2 http://www.osvdb.org/8572 https://exchange.xforce.ibmcloud.com/vulnerabilities/7641 •
CVE-2001-0331
https://notcve.org/view.php?id=CVE-2001-0331
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P http://www.kb.cert.org/vuls/id/258632 http://www.osvdb.org/1822 http://www.securityfocus.com/bid/2714 http://xforce.iss.net/alerts/advise76.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6502 •
CVE-1999-1102
https://notcve.org/view.php?id=CVE-1999-1102
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. • http://ciac.llnl.gov/ciac/bulletins/e-25.shtml http://www.aenigma.net/resources/maillist/bugtraq/1994/0091.htm http://www.phreak.org/archives/security/8lgm/8lgm.lpr •
CVE-1999-0215 – SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon
https://notcve.org/view.php?id=CVE-1999-0215
Routed allows attackers to append data to files. • https://www.exploit-db.com/exploits/20805 ftp://patches.sgi.com/support/free/security/advisories/19981004-01-PX http://www.ciac.org/ciac/bulletins/j-012.shtml •