Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.1 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-1999-1319
Vulnerability in object server program in SGI IRIX 5.2 up to and including 6.1 allows remote malicious users to gain root privileges in certain configurations.
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix
668
VMScore
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Caldera Unixware 7
Caldera Unixware 7.1.1
Caldera Unixware 7.1 .0
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
641
VMScore
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
552
VMScore
CVE-1999-1468
rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable.
Next Next 2.0
Sgi Irix 3.3.3
Next Next 2.1
Sgi Irix 3.3
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 4.0
Cray Unicos 6.0e
Sun Sunos 4.1.1
Cray Unicos 6.1
Sun Sunos 4.0.3
Sun Sunos 4.0.3c
Sun Sunos 4.1
Cray Unicos 6.0
Sun Sunos 4.1psr A
1000
VMScore
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.5f
Sgi Irix 4.0.5g
Sgi Irix 4.0.5h
Sgi Irix 5.0
Data General Dg Ux 5.4 3.1
Data General Dg Ux 5.4 4.1
Data General Dg Ux 5.4 4.11
Isc Bind 4.9.6
Sgi Irix 4.0.4b
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5 Iop
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Isc Bind 8.1.1
2 EDB exploits
641
VMScore
CVE-1999-0022
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.0
Sgi Irix 6.3
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Hp Hp-ux 10.00
Ibm Aix 3.1
Sun Sunos 5.2
Sun Sunos 5.3
Sun Sunos 5.4
Sun Sunos 4.1.1
Ibm Aix 4.1.1
Ibm Aix 4.1.2
668
VMScore
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
1000
VMScore
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
1000
VMScore
CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Tritreal Ted Cde 4.3
Sgi Irix 5.3
Sgi Irix 6.4
Hp Hp-ux 10.03
Hp Hp-ux 11.00
Ibm Aix 4.1
Ibm Aix 4.1.1
Sun Sunos 5.4
Sun Sunos 5.5
Sun Sunos 5.5.1
Sun Solaris 2.6
Ibm Aix 4.2
Ibm Aix 4.2.1
Ibm Aix 4.3
Sun Sunos 4.1.3
Sun Sunos -
Hp Hp-ux 10.02
2 EDB exploits
730
VMScore
CVE-1999-0038
Buffer overflow in xlock program allows local users to execute commands as root.
Data General Dg Ux 3.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Data General Dg Ux 5.0
Sgi Irix 6.1
Data General Dg Ux 1.0
Sgi Irix 5.0.1
Data General Dg Ux 4.0
Sgi Irix 5.1.1
Data General Dg Ux 2.0
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.1
Data General Dg Ux 6.0
Sgi Irix 5.2
Data General Dg Ux 7.0
Sgi Irix 6.3
Sgi Irix 6.0
Sun Sunos 5.3
Hp Hp-ux 10.30
Debian Debian Linux 0.93
Hp Hp-ux 10.01
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »