Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sgi irix 5 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-1999-1319
Vulnerability in object server program in SGI IRIX 5.2 up to and including 6.1 allows remote malicious users to gain root privileges in certain configurations.
Sgi Irix 5
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix
7.2
CVSSv2
CVE-1999-0049
Csetup under IRIX allows arbitrary file creation or overwriting.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.2
7.2
CVSSv2
CVE-1999-1143
Vulnerability in runtime linker program rld in SGI IRIX 6.x and previous versions allows local users to gain privileges via setuid and setgid programs.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
7.2
CVSSv2
CVE-1999-0960
IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-0959
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
1 EDB exploit
7.2
CVSSv2
CVE-1999-1272
Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges.
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.0
Sgi Irix 6.3
Sgi Irix 6.2
6.4
CVSSv2
CVE-1999-0215
Routed allows malicious users to append data to files.
Sgi Irix 6.0.1
Sgi Irix 3
Sgi Irix 6.1
Sgi Irix 6.4
Sgi Irix 5
Sgi Irix 6.3
Sgi Irix 6.2
Sgi Irix 4
1 EDB exploit
7.2
CVSSv2
CVE-1999-1384
Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x up to and including 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix
Sgi Irix 6.1
Sgi Irix 5.0.1
Sgi Irix 5.1.1
Sgi Irix 5.0
Sgi Irix 5
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.2
1 EDB exploit
10
CVSSv2
CVE-2000-0245
Vulnerability in SGI IRIX objectserver daemon allows remote malicious users to create user accounts.
Sgi Irix 6.0.1
Sgi Irix 5.3
Sgi Irix 6.1
Sgi Irix 5.2
Sgi Irix 6.0
Sgi Irix 6.2
1 EDB exploit
7.5
CVSSv2
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.2.2
Sgi Irix 6.5.9f
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
Openafs Openafs 1.1.1a
Gnu Glibc 2.1.2
Sgi Irix 6.5.4m
Sgi Irix 6.5.17f
Sgi Irix 6.5.3f
Gnu Glibc 2.2.5
Openafs Openafs 1.2.1
Sgi Irix 6.5.1
Sgi Irix 6.5.14f
Openafs Openafs 1.0
Sgi Irix 6.5.4f
Sgi Irix 6.5.10
Sgi Irix 6.5.17
Sgi Irix 6.5.13m
Openafs Openafs 1.1
Gnu Glibc 2.1.1
Openafs Openafs 1.0.2
Gnu Glibc 2.3.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3080
log injection
CVE-2024-6041
CVE-2024-37661
XML external entity
CVE-2024-0845
privilege escalation
CVE-2023-37057
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »