Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2000-0207
SGI InfoSearch CGI program infosrch.cgi allows remote malicious users to execute commands via shell metacharacters.
Sgi Infosearch 1.0
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
7.5
CVSSv2
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
2.1
CVSSv2
CVE-2004-0136
The mapelf32exec function call in IRIX 6.5.20 up to and including 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.23
Sgi Irix 6.5.24
Sgi Irix 6.5.25
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
2.1
CVSSv2
CVE-2004-0137
Unknown vulnerability in init for IRIX 6.5.20 up to and including 6.5.24 allows local users to cause a denial of service (system panic) as a result of "page invalidation issues."
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.22
Sgi Irix 6.5.23
Sgi Irix 6.5.24
Sgi Irix 6.5.25
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
5
CVSSv2
CVE-2004-1889
Unknown vulnerability in ftpd in SGI IRIX 6.5.20 up to and including 6.5.23 allows remote malicious users to cause a denial of service (hang) via a link failure with Microsoft Windows.
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
Sgi Irix 6.5.20
Sgi Irix 6.5.20f
Sgi Irix 6.5.23
Sgi Irix 6.5.20m
Sgi Irix 6.5.21
Sgi Irix 6.5.21f
6.4
CVSSv2
CVE-1999-0215
Routed allows malicious users to append data to files.
Sgi Irix 3
Sgi Irix 5
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 4
Sgi Irix 6.0.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-0036
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.4
2 EDB exploits
7.2
CVSSv2
CVE-1999-0044
fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.0.1
Sgi Irix 6.2
1 EDB exploit
5
CVSSv2
CVE-2002-0038
Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 up to and including 6.5.11 allows remote malicious users to cause a denial of service by forcing the cache to fill the disk.
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.9
6.4
CVSSv2
CVE-2000-0283
The default installation of IRIX Performance Copilot allows remote malicious users to access sensitive system information via the pmcd daemon.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »