Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.2 vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv2
CVE-1999-0215
Routed allows malicious users to append data to files.
Sgi Irix 3
Sgi Irix 5
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 4
Sgi Irix 6.0.1
1 EDB exploit
6.2
CVSSv2
CVE-1999-1410
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 6.1
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-2000-0795
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
Sgi Irix 6.3
Sgi Irix 6.2
2 EDB exploits
7.2
CVSSv2
CVE-2000-0796
Buffer overflow in dmplay in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long command line option.
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-2000-0797
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option.
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-0329
SGI mediad program allows local users to gain root access.
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.3
4.6
CVSSv2
CVE-1999-1401
Vulnerability in Desktop searchbook program in IRIX 5.0.x up to and including 6.2 sets insecure permissions for certain user files (iconbook and searchbook).
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
10
CVSSv2
CVE-1999-0692
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.1
Sgi Irix 6.5.3
Cray Unicos
7.2
CVSSv2
CVE-1999-0328
SGI permissions program allows local users to gain root privileges.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 5.1
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 6.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix 5.3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »