Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2003-0680
Unknown vulnerability in NFS for SGI IRIX 6.5.21 and previous versions may allow an NFS client to bypass read-only restrictions.
Sgi Irix 6.5.21
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
10
CVSSv2
CVE-2000-0798
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
6.4
CVSSv2
CVE-1999-1485
nsd in IRIX 6.5 up to and including 6.5.2 exports a virtual filesystem on a UDP port, which allows remote malicious users to view files and cause a possible denial of service by mounting the nsd virtual file system.
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2
1 EDB exploit
7.5
CVSSv2
CVE-2005-0138
rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not correctly allow access to anonymous clients that connect from a system whose hostname can not be determined. NOTE: while this issue occurs in a security mechanism, there is no apparent attacker role and probably does not ...
Sgi Irix 6.5.25
Sgi Irix 6.5.26
Sgi Irix 6.5.27
6.2
CVSSv2
CVE-1999-1022
serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program.
Sgi Irix 5.3
Sgi Irix 4
Sgi Irix 5.2
1 EDB exploit
4.9
CVSSv2
CVE-2002-2185
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively di...
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.18m
Sgi Irix 6.5.2
Sgi Irix 6.5.9
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
7.2
CVSSv2
CVE-1999-1181
Vulnerability in On-Line Customer Registration software for IRIX 6.2 up to and including 6.4 allows local users to gain root privileges.
Sgi Irix 6.2
Sgi Irix
7.5
CVSSv2
CVE-2001-0331
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and previous versions allows remote malicious users to execute arbitrary commands.
Sgi Irix 6.5.5
Sgi Irix
7.2
CVSSv2
CVE-1999-1286
addnetpr in SGI IRIX 6.2 and previous versions allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file.
Sgi Irix 5.3
Sgi Irix
1 EDB exploit
10
CVSSv2
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »