Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-1419
The upgrade of IRIX on Origin 3000 to 6.5.13 up to and including 6.5.16 changes the MAC address of the system, which could modify intended access restrictions that are based on a MAC address.
Sgi Irix 6.5.13
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.14
4.6
CVSSv2
CVE-2002-1516
rpcbind in SGI IRIX, when using the -w command line switch, allows local users to overwrite arbitrary files via a symlink attack.
Sgi Irix 6.5.17
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.6
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.5
3.6
CVSSv2
CVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.
Sgi Irix 6.5
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Sgi Irix 6.5.5
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.15
Sgi Irix 6.5.9
Sgi Irix 6.5.7
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.13
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
4.6
CVSSv2
CVE-2002-1517
fsr_efs in IRIX 6.5 allows local users to conduct unauthorized file activities via a symlink attack, possibly via the .fsrlast file.
Sgi Irix 6.5.13
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.6
Sgi Freeware 1.0
Sgi Irix 6.5.17
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15
Sgi Irix 6.5.16
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
4.6
CVSSv2
CVE-2002-1787
Buffer overflow in uux in eoe.sw.uucp package of SGI IRIX 6.5 up to and including 6.5.17 allows local users to execute arbitrary code via unknown attack vectors.
Sgi Irix 6.5.16
Sgi Irix 6.5.16m
Sgi Irix 6.5.17
Sgi Irix 6.5.17m
Sgi Irix 6.5.1
Sgi Irix 6.5.14m
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.13m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.3
2.1
CVSSv2
CVE-2002-1791
SGI IRIX 6.5 up to and including 6.5.17 creates temporary desktop files with world-writable permissions, which allows local users to overwrite or corrupt those files.
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.15
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.13
Sgi Irix 6.5.16m
Sgi Irix 6.5.17m
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.12
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Sgi Irix 6.5.2
Sgi Irix 6.5.7
2.1
CVSSv2
CVE-2002-1786
SGI IRIX 6.5 up to and including 6.5.14 applies a umask of 022 to root core dumps, which allows local users to read the core dumps and possibly obtain sensitive information.
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.1
Sgi Irix 6.5.14
Sgi Irix 6.5.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
2.1
CVSSv2
CVE-2002-2093
The Video Control Panel on SGI O2/IRIX 6.5, when the Default Input is set to "Output Video", allows malicious users to access a console session by running videoout then videoin.
Sgi Irix 6.5.11
Sgi Irix 6.5.11f
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.11m
Sgi Irix 6.5.12
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.13
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »