Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
10
CVSSv2
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 2.6
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
Sendmail Sendmail 8.9.3
Sendmail Advanced Message Server 1.2
Sendmail Sendmail 3.0.2
Sendmail Sendmail 3.0.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.12.4
Sendmail Sendmail 8.12.5
1 Github repository
10
CVSSv2
CVE-2003-0575
Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x up to and including 6.5.21f, and possibly earlier versions, allows malicious users to gain root privileges via the AUTH_UNIX gid list.
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Sgi Irix 6.5.19f
Sgi Irix 6.5.19m
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.18m
Sgi Irix 6.5.19
Sgi Irix 6.5.21
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
Sgi Irix 6.5.9
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.20
10
CVSSv2
CVE-2002-1584
Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote malicious users to gain privileges.
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.17
Sgi Irix 6.5.17f
Sgi Irix 6.5.2f
Sgi Irix 6.5.2m
Sgi Irix 6.5.5f
Sgi Irix 6.5.5m
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.19
Sgi Irix 6.5.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
10
CVSSv2
CVE-2002-1318
Buffer overflow in samba 2.2.2 up to and including 2.2.6 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-end...
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.18
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Samba Samba 2.2.4
Samba Samba 2.2.5
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Samba Samba 2.2.6
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Samba Samba 2.2.2
Samba Samba 2.2.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
10
CVSSv2
CVE-2002-0359
xfsmd for IRIX 6.5 up to and including 6.5.16 uses weak authentication, which allows remote malicious users to call dangerous RPC functions, including those that can mount or unmount xfs file systems, to gain root privileges.
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.12
Sgi Irix 6.5.12f
Sgi Irix 6.5.15
Sgi Irix 6.5.15f
Sgi Irix 6.5.3f
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.6f
Sgi Irix 6.5.6m
Sgi Irix 6.5.9
Sgi Irix 6.5.9f
Sgi Irix 6.5.10
Sgi Irix 6.5.10f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.13f
Sgi Irix 6.5.15m
Sgi Irix 6.5.16
Sgi Irix 6.5.4
Sgi Irix 6.5.4f
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
10
CVSSv2
CVE-2001-0248
Buffer overflow in FTP server in HPUX 11 allows remote malicious users to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
Sgi Irix 6.5.1
Hp Hp-ux 11.00
Sgi Irix 6.5.2
Sgi Irix 6.5
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »