Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
10
CVSSv2
CVE-2000-0245
Vulnerability in SGI IRIX objectserver daemon allows remote malicious users to create user accounts.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.2
1 EDB exploit
10
CVSSv2
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
1 EDB exploit
10
CVSSv2
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
10
CVSSv2
CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Tritreal Ted Cde 4.3
Sgi Irix 5.3
Sgi Irix 6.4
Hp Hp-ux 10.03
Hp Hp-ux 11.00
Ibm Aix 4.1
Ibm Aix 4.1.1
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.6
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Sunos 4.1.3
Sun Sunos -
Hp Hp-ux 10.02
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »