Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5 vulnerabilities and exploits
(subscribe to this query)
3.7
CVSSv2
CVE-2000-0799
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.4
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
3.7
CVSSv2
CVE-2000-0579
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited.
Sgi Irix 6.3
Sgi Irix 6.5
3.6
CVSSv2
CVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Sgi Irix 6.5.12
Sgi Irix 6.5.9
Sgi Irix 6.5.17m
Sgi Irix 6.5.15
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.13
2.1
CVSSv2
CVE-2005-0464
gr_osview in SGI IRIX 6.5.22, and possibly other 6.5 versions, does not drop privileges when opening description files while in debug mode, which allows local users to read a line from arbitrary files via the -d and -D options, which prints the line as a formatting error.
Sgi Irix 6.5.22
1 EDB exploit
2.1
CVSSv2
CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.5.4m
Sgi Irix 4.0.5 Iop
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 4.0.4
Sgi Irix 6.5.4f
Sgi Irix 4.0.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.1
Sgi Irix 6.5.13m
Sgi Irix 3.3.1
1 EDB exploit
2.1
CVSSv2
CVE-2003-0175
SGI IRIX prior to 6.5.21 allows local users to cause a denial of service (kernel panic) via a certain call to the PIOCSWATCH ioctl.
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Sgi Irix 6.5.9m
Sgi Irix 6.5.12
Sgi Irix 6.5.10m
Sgi Irix 6.5.15f
Sgi Irix 6.5.18f
Sgi Irix 6.5.19f
Sgi Irix 6.5.7m
Sgi Irix 6.5.9
Sgi Irix 6.5.19
Sgi Irix 6.5.16f
2.1
CVSSv2
CVE-2002-2093
The Video Control Panel on SGI O2/IRIX 6.5, when the Default Input is set to "Output Video", allows malicious users to access a console session by running videoout then videoin.
Sgi Irix 6.5.14f
Sgi Irix 6.5.13m
Sgi Irix 6.5.12
Sgi Irix 6.5.10m
Sgi Irix 6.5.13f
Sgi Irix 6.5.12f
Sgi Irix 6.5.14m
Sgi Irix 6.5.14
Sgi Irix 6.5.11f
Sgi Irix 6.5.11
Sgi Irix 6.5.11m
Sgi Irix 6.5.10f
Sgi Irix 6.5.13
Sgi Irix 6.5.12m
2.1
CVSSv2
CVE-2002-1786
SGI IRIX 6.5 up to and including 6.5.14 applies a umask of 022 to root core dumps, which allows local users to read the core dumps and possibly obtain sensitive information.
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.9
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.13
2.1
CVSSv2
CVE-2002-1791
SGI IRIX 6.5 up to and including 6.5.17 creates temporary desktop files with world-writable permissions, which allows local users to overwrite or corrupt those files.
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Sgi Irix 6.5.12
Sgi Irix 6.5.9
Sgi Irix 6.5.17m
Sgi Irix 6.5.15
Sgi Irix 6.5.14m
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Sgi Irix 6.5.4
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.13
2.1
CVSSv2
CVE-2002-0875
Vulnerability in FAM 2.6.8, 2.6.6, and other versions allows unprivileged users to obtain the names of files whose access is restricted to the root group.
Sgi Fam 2.6.6
Sgi Irix 6.5.17
Sgi Irix 6.5.15
Sgi Fam 2.6.8
Sgi Irix 6.5.16
Debian Debian Linux 3.0
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »