Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-1999-1494
colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local malicious users to read arbitrary files via the -text argument.
Sgi Irix 6.0.1
Sgi Irix 5.1.1
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
1 EDB exploit
7.2
CVSSv2
CVE-1999-0413
A buffer overflow in the SGI X server allows local users to gain root access through the X server font path.
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.5
Sgi Irix 6.2
7.2
CVSSv2
CVE-1999-0049
Csetup under IRIX allows arbitrary file creation or overwriting.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.2
10
CVSSv2
CVE-2002-1318
Buffer overflow in samba 2.2.2 up to and including 2.2.6 allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an encrypted password that causes the overflow during decryption in which a DOS codepage string is converted to a little-end...
Sgi Irix 6.5.6
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.12
Samba Samba 2.2.3
Sgi Irix 6.5.9
Sgi Irix 6.5.15
Samba Samba 2.2.4
Sgi Irix 6.5.3
Sgi Irix 6.5.14
Sgi Irix 6.5.8
Sgi Irix 6.5.5
Samba Samba 2.2.6
Sgi Irix 6.5.4
Sgi Irix 6.5.11
Samba Samba 2.2.2
Sgi Irix 6.5.2
Sgi Irix 6.5
Sgi Irix 6.5.7
Sgi Irix 6.5.18
Samba Samba 2.2.5
7.2
CVSSv2
CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
Globetrotter Flexlm 4.1
Globetrotter Flexlm 5.0
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 4.0.5 Iop
Sgi Irix 4.0
Sgi Irix 3.3.2
Sgi Irix 4.0.5h
Sgi Irix 4.0.4
Sgi Irix 4.0.1
Sgi Irix 6.1
Globetrotter Flexlm 4.0
Sgi Irix 5.0.1
Sgi Irix 4.0.5e
Sgi Irix 4.0.3
Sgi Irix 5.1.1
Sgi Irix 4.0.5a
Sgi Irix 3.3.3
Sgi Irix 6.4
Sgi Irix 4.0.5 Ipr
Sgi Irix 5.0
Sgi Irix 4.0.1t
3 EDB exploits
10
CVSSv2
CVE-1999-1319
Vulnerability in object server program in SGI IRIX 5.2 up to and including 6.1 allows remote malicious users to gain root privileges in certain configurations.
Sgi Irix 5
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix
2.1
CVSSv2
CVE-1999-0327
SGI syserr program allows local users to corrupt files.
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.2
7.1
CVSSv2
CVE-1999-0059
IRIX fam service allows an malicious user to obtain a list of all files on the server.
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 6.3
Sgi Irix 6.2
7.5
CVSSv2
CVE-1999-0148
The handler CGI program in IRIX allows arbitrary command execution.
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
5
CVSSv2
CVE-1999-1131
Buffer overflow in OSF Distributed Computing Environment (DCE) security demon (secd) in IRIX 6.4 and previous versions allows malicious users to cause a denial of service via a long principal, group, or organization.
Sgi Irix 5.3
Sgi Irix 6.4
Sgi Irix 6.3
Sgi Irix 6.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29824
CVE-2024-30095
CVE-2024-30104
client side
CVE-2024-5840
CVE-2024-34405
unprivileged
wireless
CVE-2024-4577
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »