Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0306
buffer overflow in HP xlock program.
Hp Vvos 10.24
2 EDB exploits
7.2
CVSSv2
CVE-1999-0328
SGI permissions program allows local users to gain root privileges.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 5.1
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 6.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-1399
spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed.
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-0301
Buffer overflow in SunOS/Solaris ps command.
Sun Sunos 5.3
Sun Solaris 2.4
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 2.5
Sun Sunos 5.4
Sun Sunos 5.5
1 EDB exploit
7.2
CVSSv2
CVE-1999-0028
root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
Sgi Irix
7.2
CVSSv2
CVE-1999-0025
root privileges via buffer overflow in df command on SGI IRIX systems.
Sgi Irix
1 EDB exploit
7.2
CVSSv2
CVE-1999-0029
root privileges via buffer overflow in ordist command on SGI IRIX systems.
Sgi Irix
1 EDB exploit
7.2
CVSSv2
CVE-1999-0030
root privileges via buffer overflow in xlock command on SGI IRIX systems.
Sgi Irix
2 EDB exploits
7.2
CVSSv2
CVE-1999-0027
root privileges via buffer overflow in eject command on SGI IRIX systems.
Sgi Irix
3 EDB exploits
7.2
CVSSv2
CVE-1999-0033
Command execution in Sun systems via buffer overflow in the at program.
Ncr Mp-ras 3.0
Sgi Irix
Sco Openserver 5.0
Sun Sunos 5.5
Sco Open Desktop 3.0
Sun Sunos 5.3
Ibm Aix
Sco Openserver 3.0
Sco Unixware 3.2v4
Sun Sunos 5.4
Sco Unixware 2.1
Sun Sunos 5.5.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »