Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 5.1 vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-1219
Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and previous versions allows local users to gain root privileges, possibly through the clogin command.
Sgi Irix 5.1
Sgi Irix 5.2
1 EDB exploit
7.2
CVSSv2
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.5.9f
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.4m
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.9m
Sgi Irix 6.5.10m
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.5.7m
Sgi Irix 6.5.9
Sgi Irix 6.4
Sgi Irix 6.5.2f
Sgi Irix 5.0
Sgi Irix 6.5.2m
Sgi Irix 6.5.8m
Sgi Irix 6.5.6f
10
CVSSv2
CVE-1999-0073
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an malicious user to bypass the normal system libraries and gain root access.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Digital Osf 1 1.3
Digital Unix 4.0
Digital Osf 1 3.0
Digital Osf 1 3.2
Digital Osf 1 2.0
Digital Unix 3.2g
Digital Osf 1 1.2
10
CVSSv2
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.17f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 6.5.9
Sgi Irix 6.5.16f
Sgi Irix 6.5.17m
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 6.5.9m
Sgi Irix 6.5.12
Sgi Irix 6.5.10m
Sgi Irix 5.0.1
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 5.1.1
7.2
CVSSv2
CVE-1999-0032
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Sun Sunos 4.1.4
Next Nextstep 4.0
Freebsd Freebsd 2.0.5
Bsdi Bsd Os 2.1
Freebsd Freebsd 2.1.0
Next Nextstep 4.1
Sun Sunos 4.1.3u1
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.0
2 EDB exploits
7.5
CVSSv2
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.1 .0
Sgi Irix 6.5.9
Sgi Irix 6.4
Sgi Irix 6.5.15
Caldera Unixware 7
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
7.2
CVSSv2
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Xi Graphics Dextop 2.1
Sgi Irix 6.5.12
Caldera Unixware 7.0
Sgi Irix 6.5.9
Sgi Irix 6.4
Caldera Unixware 7.1.0
Sgi Irix 6.5.15
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.0
Sgi Irix 6.3
7.2
CVSSv2
CVE-2004-0135
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 up to and including 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.5.4m
Sgi Irix 4.0.5 Iop
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 4.0.4
Sgi Irix 6.5.4f
Sgi Irix 4.0.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 3.3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »