Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 5.3 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
2.1
CVSSv2
CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
Sgi Irix 4.0.1t
Sgi Irix 4.0.2
Sgi Irix 4.0.3
Sgi Irix 4.0.4
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.17
Sgi Irix 6.5.17f
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
Sgi Irix 6.5.2f
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
1 EDB exploit
7.2
CVSSv2
CVE-2004-0135
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 up to and including 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 4.0.4
Sgi Irix 4.0.4b
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5h
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.10f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.20m
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
7.2
CVSSv2
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
7.5
CVSSv2
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Caldera Unixware 7
Caldera Unixware 7.1.1
Caldera Unixware 7.1 .0
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
7.2
CVSSv2
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.7
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.4
Sgi Irix 6.5.4f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.9m
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.5
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
7.2
CVSSv2
CVE-2001-0485
Unknown vulnerability in netprint in IRIX 6.2, and possibly other versions, allows local users with lp privileges malicious user to execute arbitrary commands via the -n option.
Sgi Irix 6.2
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »