Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 5.0 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-1999-0039
webdist CGI program (webdist.cgi) in SGI IRIX allows remote malicious users to execute arbitrary commands via shell metacharacters in the distloc parameter.
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.3
1 EDB exploit
625
VMScore
CVE-1999-1410
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 6.1
Sgi Irix 6.2
1 EDB exploit
409
VMScore
CVE-1999-1401
Vulnerability in Desktop searchbook program in IRIX 5.0.x up to and including 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
725
VMScore
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix 5.3
1 EDB exploit
725
VMScore
CVE-1999-1114
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and previous versions, and possibly other operating systems, allows local users to gain root privileges.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.0
1 EDB exploit
625
VMScore
CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.3
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 6.3
Sgi Irix 6.4
1 EDB exploit
641
VMScore
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.7
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.4
Sgi Irix 6.5.4f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.9m
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.5
1000
VMScore
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
1 EDB exploit
735
VMScore
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.1t
Sgi Irix 5.1
Sgi Irix 4.0.5 Ipr
Sgi Irix 4.0.5a
Sgi Irix 6.4
Sgi License Oeo 3.1.1
3 EDB exploits
1000
VMScore
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
CVE-2006-4304
CVE-2023-26603
CVE-2024-28327
CVE-2023-50363
CVE-2024-21905
template injection
CVE-2024-3400
cross-site request forgery
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »