Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 6.5 vulnerabilities and exploits
(subscribe to this query)
375
VMScore
CVE-2000-0799
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.2m
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.8
Sgi Irix 6.5.4
Sgi Irix 6.5
Sgi Irix 6.5.7
1 EDB exploit
329
VMScore
CVE-2000-0579
IRIX crontab creates temporary files with predictable file names and with the umask of the user, which could allow local users to modify another user's crontab file as it is being edited.
Sgi Irix 6.3
Sgi Irix 6.5
320
VMScore
CVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.
Sgi Irix 6.5
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Sgi Irix 6.5.5
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.15
Sgi Irix 6.5.9
Sgi Irix 6.5.7
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.13
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
215
VMScore
CVE-2005-0464
gr_osview in SGI IRIX 6.5.22, and possibly other 6.5 versions, does not drop privileges when opening description files while in debug mode, which allows local users to read a line from arbitrary files via the -d and -D options, which prints the line as a formatting error.
Sgi Irix 6.5.22
1 EDB exploit
215
VMScore
CVE-2005-0465
gr_osview in SGI IRIX does not drop privileges before opening files, which allows local users to overwrite arbitrary files via the -s option.
Sgi Irix 4.0.1t
Sgi Irix 4.0.2
Sgi Irix 4.0.3
Sgi Irix 4.0.4
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.17
Sgi Irix 6.5.17f
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
Sgi Irix 6.5.2f
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
1 EDB exploit
215
VMScore
CVE-2002-0875
Vulnerability in FAM 2.6.8, 2.6.6, and other versions allows unprivileged users to obtain the names of files whose access is restricted to the root group.
Sgi Fam 2.6.6
Sgi Fam 2.6.8
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Debian Debian Linux 3.0
1 EDB exploit
215
VMScore
CVE-1999-1409
The at program in IRIX 6.2 and NetBSD 1.3.2 and previous versions allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
Sgi Irix 6.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3
Netbsd Netbsd 1.1
Netbsd Netbsd 1.2
Netbsd Netbsd 1.3.1
Netbsd Netbsd
Netbsd Netbsd 1.0
1 EDB exploit
187
VMScore
CVE-2003-0175
SGI IRIX prior to 6.5.21 allows local users to cause a denial of service (kernel panic) via a certain call to the PIOCSWATCH ioctl.
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.12
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.15
Sgi Irix 6.5.15f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.4f
Sgi Irix 6.5.4m
Sgi Irix 6.5.7
Sgi Irix 6.5.7f
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.19
187
VMScore
CVE-2002-1791
SGI IRIX 6.5 up to and including 6.5.17 creates temporary desktop files with world-writable permissions, which allows local users to overwrite or corrupt those files.
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.15
Sgi Irix 6.5.15m
Sgi Irix 6.5.11
Sgi Irix 6.5.13
Sgi Irix 6.5.16m
Sgi Irix 6.5.17m
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.12
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Sgi Irix 6.5.2
Sgi Irix 6.5.7
187
VMScore
CVE-2002-1786
SGI IRIX 6.5 up to and including 6.5.14 applies a umask of 022 to root core dumps, which allows local users to read the core dumps and possibly obtain sensitive information.
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.1
Sgi Irix 6.5.14
Sgi Irix 6.5.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
NEXT »