Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0652
xfsmd for IRIX 6.5 up to and including 6.5.16 allows remote malicious users to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs().
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5
Sgi Irix 6.5.16
Sgi Irix 6.5.2
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.3
Sgi Irix 6.5.4
1 EDB exploit
10
CVSSv2
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
4.6
CVSSv2
CVE-2002-1517
fsr_efs in IRIX 6.5 allows local users to conduct unauthorized file activities via a symlink attack, possibly via the .fsrlast file.
Sgi Irix 6.5.13
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.6
Sgi Freeware 1.0
Sgi Irix 6.5.17
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15
Sgi Irix 6.5.16
2.1
CVSSv2
CVE-2002-1786
SGI IRIX 6.5 up to and including 6.5.14 applies a umask of 022 to root core dumps, which allows local users to read the core dumps and possibly obtain sensitive information.
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.1
Sgi Irix 6.5.14
Sgi Irix 6.5.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
2.1
CVSSv2
CVE-2002-0042
Vulnerability in the XFS file system for SGI IRIX prior to 6.5.12 allows local users to cause a denial of service (hang) by creating a file that is not properly processed by XFS.
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.11f
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.11m
Sgi Irix 6.5.3
2.1
CVSSv2
CVE-2002-2093
The Video Control Panel on SGI O2/IRIX 6.5, when the Default Input is set to "Output Video", allows malicious users to access a console session by running videoout then videoin.
Sgi Irix 6.5.11
Sgi Irix 6.5.11f
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.11m
Sgi Irix 6.5.12
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.13
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
7.2
CVSSv2
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix 5.3
1 EDB exploit
2.1
CVSSv2
CVE-2002-0355
netstat in SGI IRIX prior to 6.5.12 allows local users to determine the existence of files on the system, even if the users do not have the appropriate permissions.
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.3
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
7.2
CVSSv2
CVE-1999-1114
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and previous versions, and possibly other operating systems, allows local users to gain root privileges.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.0
1 EDB exploit
6.2
CVSSv2
CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.3
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 6.3
Sgi Irix 6.4
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »