Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi vulnerabilities and exploits
(subscribe to this query)
570
VMScore
CVE-2000-0283
The default installation of IRIX Performance Copilot allows remote malicious users to access sensitive system information via the pmcd daemon.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
465
VMScore
CVE-1999-1120
netprint in SGI IRIX 6.4 and previous versions trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
Sgi Irix
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.1
1 EDB exploit
725
VMScore
CVE-1999-0959
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.4
Sgi Irix 6.2
Sgi Irix 6.3
1 EDB exploit
725
VMScore
CVE-1999-0960
IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option.
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.0.1
Sgi Irix 6.2
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.1
1 EDB exploit
641
VMScore
CVE-1999-1272
Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.0
755
VMScore
CVE-1999-0039
webdist CGI program (webdist.cgi) in SGI IRIX allows remote malicious users to execute arbitrary commands via shell metacharacters in the distloc parameter.
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.3
1 EDB exploit
1000
VMScore
CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Sgi Irix 6.5
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
1 EDB exploit
409
VMScore
CVE-2002-1323
Safe.pm 2.0.7 and previous versions, when used in Perl 5.8.0 and previous versions, may allow malicious users to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
Safe.pm Safe.pm 2.0 7
Sun Linux 5.0.7
Sgi Irix 6.5.14
Sgi Irix 6.5.15
Sgi Irix 6.5.19
Sgi Irix 6.5.19f
Sgi Irix 6.5.22
Sgi Irix 6.5.3
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.17f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Safe.pm Safe.pm 2.0 6
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.18f
Sgi Irix 6.5.18m
890
VMScore
CVE-1999-0692
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.1
Sgi Irix 6.5.3
Cray Unicos
735
VMScore
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.1t
Sgi Irix 5.1
Sgi Irix 4.0.5 Ipr
Sgi Irix 4.0.5a
Sgi Irix 6.4
Sgi License Oeo 3.1.1
3 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »