Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-0799
Buffer overflows in lpsched in IRIX 6.5.13f and previous versions allow remote malicious users to execute arbitrary commands via a long argument.
Sgi Irix
10
CVSSv2
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
10
CVSSv2
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
10
CVSSv2
CVE-2001-0248
Buffer overflow in FTP server in HPUX 11 allows remote malicious users to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
Sgi Irix 6.5.1
Hp Hp-ux 11.00
Sgi Irix 6.5.2
Sgi Irix 6.5
10
CVSSv2
CVE-2001-0249
Heap overflow in FTP daemon in Solaris 8 allows remote malicious users to execute arbitrary commands by creating a long pathname and calling the LIST command, which uses glob to generate long strings.
Hp Hp-ux 11.00
Oracle Solaris 8
Sgi Irix
10
CVSSv2
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Conectiva Linux 4.0es
Conectiva Linux 4.1
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Conectiva Linux 4.2
Conectiva Linux 5.0
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Immunix Immunix 6.2
Conectiva Linux 4.0
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Caldera Openlinux Ebuilder 3.0
Conectiva Linux 5.1
Sgi Irix 6.2
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Caldera Openlinux
11 EDB exploits
10
CVSSv2
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
10
CVSSv2
CVE-2000-0798
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
10
CVSSv2
CVE-2000-0245
Vulnerability in SGI IRIX objectserver daemon allows remote malicious users to create user accounts.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.2
1 EDB exploit
10
CVSSv2
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »