
CVE-2002-0038
https://notcve.org/view.php?id=CVE-2002-0038
31 Jan 2002 — Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 through 6.5.11 allows remote attackers to cause a denial of service by forcing the cache to fill the disk. Vulnerabilidad en la función limitadora de cache en el demonio nsd de IRIX 6.5.4 hasta la 6.5.11 permite que atacantes remotos causen una denegación de servicio forzando que la caché ocupe todo el disco. • ftp://patches.sgi.com/support/free/security/advisories/20020102-01-I •

CVE-2001-0796
https://notcve.org/view.php?id=CVE-2001-0796
06 Dec 2001 — SGI IRIX 6.5 through 6.5.12f and possibly earlier versions, and FreeBSD 3.0, allows remote attackers to cause a denial of service via a malformed IGMP multicast packet with a small response delay. SGI IRIX 6.5 a 6.5.12f y posiblemente versiones anteriores, y FreeBSD 3.0, permiten a un atacante remoto producir una denegación de servicio mediante un paquete un paquete IGMP malformado con un pequeño retardo de respuesta. • ftp://patches.sgi.com/support/free/security/advisories/20011001-01-P •

CVE-2001-0801
https://notcve.org/view.php?id=CVE-2001-0801
06 Dec 2001 — lpstat in IRIX 6.5.13f and earlier allows local users to gain root privileges by specifying a Trojan Horse nettype shared library. lpstat en IRIX 6.5.13.f y anteriores permite a usuarios locales obtener privilegios de root especificando un caballo de troya como librería compartida de nettype. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P •

CVE-2001-0800 – Irix LPD tagprinter - Command Execution
https://notcve.org/view.php?id=CVE-2001-0800
22 Nov 2001 — lpsched in IRIX 6.5.13f and earlier allows remote attackers to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/10033 •

CVE-2001-0799
https://notcve.org/view.php?id=CVE-2001-0799
22 Nov 2001 — Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument. • ftp://patches.sgi.com/support/free/security/advisories/20011003-02-P •

CVE-2001-0247 – FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0247
24 May 2001 — Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 •

CVE-2001-0249
https://notcve.org/view.php?id=CVE-2001-0249
24 May 2001 — Heap overflow in FTP daemon in Solaris 8 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings. • http://www.cert.org/advisories/CA-2001-07.html • CWE-131: Incorrect Calculation of Buffer Size •

CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 •

CVE-2000-1221 – RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution
https://notcve.org/view.php?id=CVE-2000-1221
08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 •

CVE-1999-1461 – SGI IRIX 6.4 - 'inpview' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1461
07 May 1997 — inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 •