Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-1999-0959
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.4
Sgi Irix 6.2
Sgi Irix 6.3
1 EDB exploit
7.2
CVSSv2
CVE-1999-0960
IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option.
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.0.1
Sgi Irix 6.2
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.1
1 EDB exploit
7.2
CVSSv2
CVE-1999-1272
Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.0
7.5
CVSSv2
CVE-1999-0039
webdist CGI program (webdist.cgi) in SGI IRIX allows remote malicious users to execute arbitrary commands via shell metacharacters in the distloc parameter.
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.3
1 EDB exploit
10
CVSSv2
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
7.5
CVSSv2
CVE-2000-0207
SGI InfoSearch CGI program infosrch.cgi allows remote malicious users to execute commands via shell metacharacters.
Sgi Infosearch 1.0
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
1 EDB exploit
4.6
CVSSv2
CVE-2002-1323
Safe.pm 2.0.7 and previous versions, when used in Perl 5.8.0 and previous versions, may allow malicious users to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Safe.pm Safe.pm 2.0 7
Sun Linux 5.0.7
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.19
Sgi Irix 6.5.19f
Sgi Irix 6.5.22
Sgi Irix 6.5.3
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Safe.pm Safe.pm 2.0 6
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
10
CVSSv2
CVE-1999-0692
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.1
Sgi Irix 6.5.3
Cray Unicos
10
CVSSv2
CVE-2000-0245
Vulnerability in SGI IRIX objectserver daemon allows remote malicious users to create user accounts.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-1461
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program.
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.10
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »