Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0733
Telnetd telnet server in IRIX 5.2 up to and including 6.1 does not properly cleans user-injected format strings, which allows remote malicious users to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request.
Sgi Irix 6.5.6
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 5.2
Sgi Irix 6.5.4
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.2
1 EDB exploit
NA
CVE-2000-0283
The default installation of IRIX Performance Copilot allows remote malicious users to access sensitive system information via the pmcd daemon.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.4
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Sgi Irix 6.3
Sgi Irix 6.2
NA
CVE-2000-0207
SGI InfoSearch CGI program infosrch.cgi allows remote malicious users to execute commands via shell metacharacters.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Infosearch 1.0
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
NA
CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote malicious users to bypass intende...
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.17f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 6.5.9
Sgi Irix 6.5.16f
Sgi Irix 6.5.17m
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
NA
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.17f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 6.5.9
Sgi Irix 6.5.16f
Sgi Irix 6.5.17m
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
NA
CVE-1999-0692
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Sgi Irix 6.5.1
Sgi Irix 6.4
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.3
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.2
Cray Unicos
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6