Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0631
Unknown vulnerability in nveventd in NetVisualyzer on SGI IRIX 6.5 up to and including 6.5.16 allows local users to write arbitrary files and gain root privileges.
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.15
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.1
Sgi Irix 6.5.16
Sgi Irix 6.5.3
NA
CVE-2002-0632
Vulnerability in SGI BDS (Bulk Data Service) BDSPro 2.4 and previous versions allows clients to read arbitrary files on a BDS server.
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.2
Sgi Irix 6.5.9
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.1
Sgi Irix 6.5.14
Sgi Irix 6.5.16
Sgi Irix 6.5.8
NA
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
NA
CVE-2002-1786
SGI IRIX 6.5 up to and including 6.5.14 applies a umask of 022 to root core dumps, which allows local users to read the core dumps and possibly obtain sensitive information.
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.1
Sgi Irix 6.5.14
Sgi Irix 6.5.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
NA
CVE-2002-2093
The Video Control Panel on SGI O2/IRIX 6.5, when the Default Input is set to "Output Video", allows malicious users to access a console session by running videoout then videoin.
Sgi Irix 6.5.11
Sgi Irix 6.5.11f
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.11m
Sgi Irix 6.5.12
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.13
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
NA
CVE-2002-0042
Vulnerability in the XFS file system for SGI IRIX prior to 6.5.12 allows local users to cause a denial of service (hang) by creating a file that is not properly processed by XFS.
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.11f
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.11m
Sgi Irix 6.5.3
NA
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 5.2
Sgi Irix 5.3
1 EDB exploit
NA
CVE-2002-0355
netstat in SGI IRIX prior to 6.5.12 allows local users to determine the existence of files on the system, even if the users do not have the appropriate permissions.
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.3
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
NA
CVE-1999-1114
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and previous versions, and possibly other operating systems, allows local users to gain root privileges.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.0
1 EDB exploit
NA
CVE-1999-1398
Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack.
Sgi Irix 5.0
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.3
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 6.3
Sgi Irix 6.4
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »