Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.0.1 vulnerabilities and exploits
(subscribe to this query)
6.2
CVSSv2
CVE-1999-1410
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 6.1
Sgi Irix 6.2
1 EDB exploit
4.6
CVSSv2
CVE-1999-1401
Vulnerability in Desktop searchbook program in IRIX 5.0.x up to and including 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
7.2
CVSSv2
CVE-1999-0329
SGI mediad program allows local users to gain root access.
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.3
7.2
CVSSv2
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix 5.3
1 EDB exploit
7.2
CVSSv2
CVE-1999-0328
SGI permissions program allows local users to gain root privileges.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 5.1
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 6.1
1 EDB exploit
6.2
CVSSv2
CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.3
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 6.3
Sgi Irix 6.4
1 EDB exploit
7.2
CVSSv2
CVE-1999-1114
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and previous versions, and possibly other operating systems, allows local users to gain root privileges.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.0
1 EDB exploit
10
CVSSv2
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
7.2
CVSSv2
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.7
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.4
Sgi Irix 6.5.4f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.9m
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.5
10
CVSSv2
CVE-1999-0073
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an malicious user to bypass the normal system libraries and gain root access.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Digital Osf 1 1.3
Digital Unix 4.0
Digital Osf 1 3.0
Digital Osf 1 3.2
Digital Osf 1 2.0
Digital Unix 3.2g
Digital Osf 1 1.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site scripting
CVE-2024-5158
XML external entity
CVE-2024-4262
CVE-2024-2036
CVE-2024-4985
CVE-2024-21791
remote attackers
CVE-2023-43208
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »