Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 5.0.1 vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.3
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 6.3
Sgi Irix 6.4
1 EDB exploit
7.2
CVSSv2
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
Data General Dg Ux 3.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Data General Dg Ux 5.0
Sgi Irix 6.1
Data General Dg Ux 1.0
Sgi Irix 5.0.1
Data General Dg Ux 4.0
Sgi Irix 5.1.1
Data General Dg Ux 2.0
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Data General Dg Ux 6.0
Sgi Irix 5.2
Data General Dg Ux 7.0
Sgi Irix 6.3
Sgi Irix 6.0
Sun Sunos 5.3
Hp Hp-ux 10.30
Debian Debian Linux 0.93
Hp Hp-ux 10.01
2 EDB exploits
7.2
CVSSv2
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.1t
Sgi Irix 5.1
Sgi Irix 4.0.5 Ipr
Sgi Irix 4.0.5a
Sgi Irix 6.4
Sgi License Oeo 3.1.1
3 EDB exploits
4.6
CVSSv2
CVE-1999-1401
Vulnerability in Desktop searchbook program in IRIX 5.0.x up to and including 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
7.2
CVSSv2
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix 5.3
1 EDB exploit
7.2
CVSSv2
CVE-1999-0032
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
Sgi Irix 5.0
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.4
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.3
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Bsdi Bsd Os 2.1
Next Nextstep 4.0
Sun Sunos 4.1.3u1
Next Nextstep 4.1
Sun Sunos 4.1.4
2 EDB exploits
7.2
CVSSv2
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.0
Sgi Irix 6.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Hp Hp-ux 10.00
Ibm Aix 3.1
Sun Sunos 5.2
Sun Sunos 5.3
Sun Sunos 5.4
Sun Sunos 4.1.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
10
CVSSv2
CVE-1999-0073
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an malicious user to bypass the normal system libraries and gain root access.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Digital Osf 1 1.3
Digital Unix 4.0
Digital Osf 1 3.0
Digital Osf 1 3.2
Digital Osf 1 2.0
Digital Unix 3.2g
Digital Osf 1 1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2