Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2002-0213
xkas in Xinet K-AShare 0.011.01 for IRIX allows local users to read arbitrary files via a symlink attack on the VOLICON file, which is copied to the .HSicon file in a shared directory.
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Xinet K-ashare 11.01
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.2
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
7.2
CVSSv2
CVE-2002-0173
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and previous versions may allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 5.0
Sgi Irix 5.0.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.10m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.7
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.4
Sgi Irix 6.5.4f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.9m
Sgi Irix 5.1.1
Sgi Irix 5.3
Sgi Irix 6.5
5
CVSSv2
CVE-2002-0041
Unknown vulnerability in Mail for SGI IRIX 6.5 up to and including 6.5.15f, and possibly earlier versions, when running with the -R option, allows local and remote malicious users to cause a core dump.
Sgi Irix 6.5.11f
Sgi Irix 6.5.12f
Sgi Irix 6.5.14m
Sgi Irix 6.5.15m
Sgi Irix 6.5.3
Sgi Irix 6.5.8
Sgi Irix 6.5.12m
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.14f
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.10
Sgi Irix 6.5.11m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.9
7.5
CVSSv2
CVE-2002-0017
Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 up to and including 6.5.15m allows remote malicious users to execute arbitrary code via an SNMP request.
Sgi Irix 6.5.11m
Sgi Irix 6.5.12m
Sgi Irix 6.5.15f
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.11f
Sgi Irix 6.5.12f
Sgi Irix 6.5.15m
Sgi Irix 6.5.3
5
CVSSv2
CVE-2002-0039
rpcbind in SGI IRIX 6.5 up to and including 6.5.15f, and possibly earlier versions, allows remote malicious users to cause a denial of service (crash) via malformed RPC packets with invalid lengths.
Sgi Irix 6.5.11m
Sgi Irix 6.5.12m
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.11f
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.13m
Sgi Irix 6.5.14f
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.12f
Sgi Irix 6.5.13f
Sgi Irix 6.5.3
Sgi Irix 6.5.5
2.1
CVSSv2
CVE-2002-0040
Vulnerability in SGI IRIX 6.5.11 up to and including 6.5.15f allows local users to cause privileged applications to dump core via the HOSTALIASES environment variable, which might allow the users to gain privileges.
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.13f
Sgi Irix 6.5.14f
Sgi Irix 6.5.5
Sgi Irix 6.5.7
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.13m
Sgi Irix 6.5.14m
Sgi Irix 6.5.6
Sgi Irix 6.5.8
7.2
CVSSv2
CVE-2001-0891
Format string vulnerability in NQS daemon (nqsdaemon) in NQE 3.3.0.16 for CRAY UNICOS and SGI IRIX allows a local user to gain root privileges by using qsub to submit a batch job whose name contains formatting characters.
Sgi Nqsdaemon 3.3.0.16
Cray Unicos
5
CVSSv2
CVE-2002-0038
Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 up to and including 6.5.11 allows remote malicious users to cause a denial of service by forcing the cache to fill the disk.
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.9
10
CVSSv2
CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote malicious users to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Sgi Irix 3.2
Sgi Irix 3.3.2
Sgi Irix 3.3.3
Sgi Irix 3.3
Sgi Irix 3.3.1
Hp Hp-ux 10.01
Hp Hp-ux 10.10
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Sco Openserver 5.0.5
Sco Openserver 5.0.6
Sun Solaris 2.4
Sun Sunos 5.5
Sun Sunos 5.7
Sun Solaris 7.0
Hp Hp-ux 11.0.4
Hp Hp-ux 11.00
Sco Openserver 5.0
Sco Openserver 5.0.1
Sun Sunos 5.1
Sun Sunos 5.2
Sun Solaris 2.5.1
8 EDB exploits
2 Github repositories
10
CVSSv2
CVE-2001-0799
Buffer overflows in lpsched in IRIX 6.5.13f and previous versions allow remote malicious users to execute arbitrary commands via a long argument.
Sgi Irix
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »