Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs/oncplus
Ibm Aix 4.3.2
Ibm Aix 4.3
Ibm Aix 4
Ibm Aix 5.2.0.50
Ibm Aix 4.2.1
Ibm Aix 3.2.5
Ibm Aix
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2.1.12
Ibm Aix 4.2
Ibm Aix 4.1.5
Ibm Aix 1.2.1
Ibm Aix 4.3.0
Ibm Aix 430
Ibm Aix 5.2
Ibm Aix 5.2 L
Ibm Aix 5.2.0.54
Ibm Aix 6.1
Ibm Aix 3.2.0
Ibm Aix 4.0
1 EDB exploit
NA
CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.5.4m
Sgi Irix 4.0.5 Iop
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 4.0.4
Sgi Irix 6.5.4f
Sgi Irix 4.0.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 3.3.1
1 EDB exploit
NA
CVE-2004-0135
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 up to and including 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.5.4m
Sgi Irix 4.0.5 Iop
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 4.0.4
Sgi Irix 6.5.4f
Sgi Irix 4.0.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 3.3.1
NA
CVE-2003-0694
The prescan function in Sendmail 8.12.9 allows remote malicious users to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Sendmail Sendmail Switch 2.1.2
Sendmail Sendmail Switch 3.0.2
Sendmail Sendmail Switch 2.2.2
Sendmail Sendmail 2.6.2
Sendmail Sendmail 8.9.2
Sendmail Sendmail Switch 2.1.1
Sendmail Sendmail 8.11.4
Sendmail Sendmail 8.8.8
Sendmail Sendmail 8.12
Sgi Irix 6.5.17f
Sendmail Sendmail 2.6
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.0
Sendmail Sendmail Switch 2.1.3
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.11.3
Sendmail Sendmail Switch 2.2.1
Sendmail Sendmail 2.6.1
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 8.12.8
Sgi Irix 6.5.18f
Sgi Irix 6.5.19f
1 Github repository
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.2.2
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Openafs Openafs 1.1.1a
Gnu Glibc 2.1.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Gnu Glibc 2.2.5
Openafs Openafs 1.2.1
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Openafs Openafs 1.0
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Openafs Openafs 1.1
Gnu Glibc 2.1.1
Openafs Openafs 1.0.2
Gnu Glibc 2.3.1
NA
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 6.5.9m
Sgi Irix 6.5.12
Sgi Irix 6.5.10m
Sgi Irix 5.0.1
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 5.1.1
NA
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.1 .0
Sgi Irix 6.5.9
Sgi Irix 6.4
Sgi Irix 6.5.15
Caldera Unixware 7
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
NA
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.0
Sgi Irix 6.5.9
Sgi Irix 6.4
Caldera Unixware 7.1.0
Sgi Irix 6.5.15
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
NA
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.5.9f
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.4m
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.9m
Sgi Irix 6.5.10m
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.5.7m
Sgi Irix 6.5.9
Sgi Irix 6.4
Sgi Irix 6.5.2f
Sgi Irix 5.0
Sgi Irix 6.5.2m
Sgi Irix 6.5.8m
Sgi Irix 6.5.6f
NA
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.5.7
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
3 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »