Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5.24 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-0139
Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 up to and including 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors.
Sgi Irix 6.5.23
Sgi Irix 6.5.24
Sgi Irix 6.5.22
Sgi Irix 6.5.25
NA
CVE-2004-0136
The mapelf32exec function call in IRIX 6.5.20 up to and including 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."
Sgi Irix 6.5.23
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
Sgi Irix 6.5.20m
Sgi Irix 6.5.20f
Sgi Irix 6.5.24
Sgi Irix 6.5.22
Sgi Irix 6.5.25
NA
CVE-2004-0137
Unknown vulnerability in init for IRIX 6.5.20 up to and including 6.5.24 allows local users to cause a denial of service (system panic) as a result of "page invalidation issues."
Sgi Irix 6.5.23
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
Sgi Irix 6.5.20m
Sgi Irix 6.5.20f
Sgi Irix 6.5.24
Sgi Irix 6.5.22
Sgi Irix 6.5.25
NA
CVE-2004-0483
Unknown vulnerability in rpc.mountd for SGI IRIX 6.5.24 allows remote malicious users to cause a denial of service (infinite loop) via certain RPC requests.
Sgi Irix 6.5.24
NA
CVE-2004-0135
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 up to and including 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.5.4m
Sgi Irix 4.0.5 Iop
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 4.0.4
Sgi Irix 6.5.4f
Sgi Irix 4.0.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 3.3.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started