Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-1999-0327
SGI syserr program allows local users to corrupt files.
Sgi Irix 5.3
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
890
VMScore
CVE-2004-0139
Unknown vulnerability in the bsd.a kernel networking for SGI IRIX 6.5.22 up to and including 6.5.25, and possibly earlier versions, in which "t_unbind changes t_bind's behavior," has unknown impact and attack vectors.
Sgi Irix 6.5.24
Sgi Irix 6.5.25
Sgi Irix 6.5.22
Sgi Irix 6.5.23
465
VMScore
CVE-1999-1243
SGI Desktop Permissions Tool in IRIX 6.0.1 and previous versions allows local users to modify permissions for arbitrary files and gain privileges.
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix
1 EDB exploit
890
VMScore
CVE-1999-0073
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an malicious user to bypass the normal system libraries and gain root access.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.0
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
Digital Osf 1 1.3
Digital Unix 4.0
Digital Osf 1 3.0
Digital Osf 1 3.2
Digital Osf 1 2.0
Digital Unix 3.2g
Digital Osf 1 1.2
730
VMScore
CVE-1999-0032
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
Sgi Irix 5.0
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.2
Sgi Irix 6.4
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 6.3
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Bsdi Bsd Os 2.1
Next Nextstep 4.0
Sun Sunos 4.1.3u1
Next Nextstep 4.1
Sun Sunos 4.1.4
2 EDB exploits
668
VMScore
CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote malicious users to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure.
Caldera Unixware 7
Caldera Unixware 7.1.1
Caldera Unixware 7.1 .0
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.6
641
VMScore
CVE-2002-0678
CDE ToolTalk database server (ttdbserver) allows local users to overwrite arbitrary files via a symlink attack on the transaction log file used by the _TT_TRANSACTION RPC procedure.
Xi Graphics Dextop 2.1
Sgi Irix 5.2
Sgi Irix 6.4
Sgi Irix 6.5
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.9
Caldera Unixware 7.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Caldera Unixware 7.1.0
Caldera Unixware 7.1.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.5.13
Sgi Irix 6.5.14
Sgi Irix 6.5.7
Sgi Irix 6.5.8
668
VMScore
CVE-2005-0138
rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not correctly allow access to anonymous clients that connect from a system whose hostname can not be determined. NOTE: while this issue occurs in a security mechanism, there is no apparent attacker role and probably does not ...
Sgi Irix 6.5.25
Sgi Irix 6.5.26
Sgi Irix 6.5.27
668
VMScore
CVE-2005-0139
Unknown vulnerability in rpc.mountd in SGI IRIX 6.5.25, 6.5.26, and 6.5.27 does not sufficiently restrict access rights for read-mostly exports, which allows malicious users to conduct unauthorized activities.
Sgi Irix 6.5.27
Sgi Irix 6.5.26
Sgi Irix 6.5.25
668
VMScore
CVE-2003-0680
Unknown vulnerability in NFS for SGI IRIX 6.5.21 and previous versions may allow an NFS client to bypass read-only restrictions.
Sgi Irix 6.5.21
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »