Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 5.1 vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Bsdi Bsd Os 1.1
Sun Sunos 5.3
Hp Hp-ux 10.00
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 4.1.4
Ibm Aix 4.2
Ibm Aix 4.1.5
Freebsd Freebsd 2.0.5
Ibm Aix 3.1
10
CVSSv2
CVE-1999-0208
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.
Sgi Irix 3
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 4
Nec Ews-ux V
Nec Up-ux V
Nec Asl Ux 4800
Ibm Aix 4.1
Ibm Aix 3.2
2 EDB exploits
10
CVSSv2
CVE-1999-0073
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an malicious user to bypass the normal system libraries and gain root access.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Digital Osf 1 1.3
Digital Unix 4.0
Digital Osf 1 3.0
Digital Osf 1 3.2
Digital Osf 1 2.0
Digital Unix 3.2g
Digital Osf 1 1.2
7.2
CVSSv2
CVE-1999-1219
Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and previous versions allows local users to gain root privileges, possibly through the clogin command.
Sgi Irix 5.1
Sgi Irix 5.2
1 EDB exploit
2.1
CVSSv2
CVE-1999-1494
colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local malicious users to read arbitrary files via the -text argument.
Sgi Irix 6.0.1
Sgi Irix 5.1.1
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege
CVE-2022-48762
CVE-2022-48751
CVE-2024-37079
CVE-2024-30848
LFI
man-in-the-middle
CVE-2022-48736
CVE-2024-30103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4