Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5.11 vulnerabilities and exploits
(subscribe to this query)
641
VMScore
CVE-2002-0174
nsd on SGI IRIX prior to 6.5.11 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the nsd.dump file.
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.3
Sgi Irix 6.5.2
Sgi Irix 6.5.4
445
VMScore
CVE-2004-2002
Unknown vulnerability in SGI IRIX 6.5 up to and including 6.5.22m allows remote malicious users to cause a denial of service via a certain UDP packet.
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.21
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.5m
Sgi Irix 6.5.6
Sgi Irix 6.5.8f
Sgi Irix 6.5.8m
Sgi Irix 6.5.9
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.13
Sgi Irix 6.5.13f
890
VMScore
CVE-2002-1584
Unknown vulnerability in the AUTH_DES authentication for RPC in Solaris 2.5.1, 2.6, and 7, SGI IRIX 6.5 to 6.5.19f, and possibly other platforms, allows remote malicious users to gain privileges.
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.17
Sgi Irix 6.5.17f
Sgi Irix 6.5.2f
Sgi Irix 6.5.2m
Sgi Irix 6.5.5f
Sgi Irix 6.5.5m
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.19
Sgi Irix 6.5.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
409
VMScore
CVE-2002-1323
Safe.pm 2.0.7 and previous versions, when used in Perl 5.8.0 and previous versions, may allow malicious users to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Safe.pm Safe.pm 2.0 7
Sun Linux 5.0.7
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.19
Sgi Irix 6.5.19f
Sgi Irix 6.5.22
Sgi Irix 6.5.3
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Safe.pm Safe.pm 2.0 6
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
641
VMScore
CVE-2003-0173
xfsdq in xfsdump does not create quota information files securely, which allows local users to gain root privileges.
Xfsdump Xfsdump 2.0.0
Xfsdump Xfsdump 2.0.2
Sgi Irix 6.5.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.11
Sgi Irix 6.5.12m
Sgi Irix 6.5.13f
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.18
Sgi Irix 6.5.18m
Sgi Irix 6.5.19f
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.6m
Sgi Irix 6.5.9
Sgi Irix 6.5.9m
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.12
Sgi Irix 6.5.12f
641
VMScore
CVE-2004-0135
The syssgi SGI_IOPROBE system call in IRIX 6.5.20 up to and including 6.5.24 allows local users to gain privileges by reading and writing to kernel memory.
Sgi Irix 3.3.1
Sgi Irix 3.3.2
Sgi Irix 4.0.4
Sgi Irix 4.0.4b
Sgi Irix 3.3.3
Sgi Irix 4.0
Sgi Irix 4.0.4t
Sgi Irix 4.0.5
Sgi Irix 4.0.5h
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.10f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.20m
215
VMScore
CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
Sgi Irix 4.0.1t
Sgi Irix 4.0.2
Sgi Irix 4.0.3
Sgi Irix 4.0.4
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.17
Sgi Irix 6.5.17f
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
Sgi Irix 6.5.2f
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
1 EDB exploit
730
VMScore
CVE-2000-0795
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
Sgi Irix 6.3
Sgi Irix 6.2
2 EDB exploits
668
VMScore
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
641
VMScore
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »