Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0893
The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote malicious users to identify the target host as an SGI system.
Sgi Irix
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
7.2
CVSSv2
CVE-2000-0794
Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview.
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-2000-0796
Buffer overflow in dmplay in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long command line option.
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-2000-0797
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option.
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
10
CVSSv2
CVE-2000-0798
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
3.7
CVSSv2
CVE-2000-0799
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.4
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
7.2
CVSSv2
CVE-2000-0795
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
Sgi Irix 6.3
Sgi Irix 6.2
2 EDB exploits
3.7
CVSSv2
CVE-2000-0579
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited.
Sgi Irix 6.3
Sgi Irix 6.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »