Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5.1 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-0174
nsd on SGI IRIX prior to 6.5.11 allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the nsd.dump file.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.9
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
NA
CVE-2002-0172
/dev/ipfilter on SGI IRIX 6.5 is installed by /dev/MAKEDEV with insecure default permissions (644), which could allow a local user to cause a denial of service (traffic disruption).
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.9
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
NA
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.5.9f
Sgi Irix 6.5.6
Sgi Irix 5.3
Sgi Irix 6.0.1
Sgi Irix 6.5.4m
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.9m
Sgi Irix 6.5.10m
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.5.7m
Sgi Irix 6.5.9
Sgi Irix 6.4
Sgi Irix 6.5.2f
Sgi Irix 5.0
Sgi Irix 6.5.2m
Sgi Irix 6.5.8m
Sgi Irix 6.5.6f
NA
CVE-2002-0213
xkas in Xinet K-AShare 0.011.01 for IRIX allows local users to read arbitrary files via a symlink attack on the VOLICON file, which is copied to the .HSicon file in a shared directory.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.9
Sgi Irix 6.5.15
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Xinet K-ashare 11.01
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.13
NA
CVE-2002-0041
Unknown vulnerability in Mail for SGI IRIX 6.5 up to and including 6.5.15f, and possibly earlier versions, when running with the -R option, allows local and remote malicious users to cause a core dump.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.13m
Sgi Irix 6.5.15f
Sgi Irix 6.5.9
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.12m
NA
CVE-2002-0017
Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 up to and including 6.5.15m allows remote malicious users to execute arbitrary code via an SNMP request.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.13m
Sgi Irix 6.5.15f
Sgi Irix 6.5.9
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.12m
NA
CVE-2002-0040
Vulnerability in SGI IRIX 6.5.11 up to and including 6.5.15f allows local users to cause privileged applications to dump core via the HOSTALIASES environment variable, which might allow the users to gain privileges.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.13m
Sgi Irix 6.5.15f
Sgi Irix 6.5.9
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.12m
NA
CVE-2002-0039
rpcbind in SGI IRIX 6.5 up to and including 6.5.15f, and possibly earlier versions, allows remote malicious users to cause a denial of service (crash) via malformed RPC packets with invalid lengths.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.13m
Sgi Irix 6.5.15f
Sgi Irix 6.5.9
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.12m
NA
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.5.7
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1.1
Freebsd Freebsd 3.1
Openbsd Openbsd 2.8
Freebsd Freebsd 2.2.5
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
3 EDB exploits
NA
CVE-2000-0844
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local malicious users to execute arbitrary commands via functions such as gettext and catopen.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Conectiva Linux 4.2
Conectiva Linux 4.1
Conectiva Linux 5.1
Immunix Immunix 6.2
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Conectiva Linux 4.0es
Caldera Openlinux Ebuilder 3.0
Sgi Irix 6.5.4
Sgi Irix 6.3
Conectiva Linux 5.0
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
Conectiva Linux 4.0
Suse Suse Linux 6.2
11 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »