Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2004-1889
Unknown vulnerability in ftpd in SGI IRIX 6.5.20 up to and including 6.5.23 allows remote malicious users to cause a denial of service (hang) via a link failure with Microsoft Windows.
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
Sgi Irix 6.5.20
Sgi Irix 6.5.20f
Sgi Irix 6.5.23
Sgi Irix 6.5.20m
Sgi Irix 6.5.21
Sgi Irix 6.5.21f
NA
CVE-2002-0038
Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 up to and including 6.5.11 allows remote malicious users to cause a denial of service by forcing the cache to fill the disk.
Sgi Irix 6.5.4
Sgi Irix 6.5.5
Sgi Irix 6.5.10
Sgi Irix 6.5.11
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.9
NA
CVE-1999-0215
Routed allows malicious users to append data to files.
Sgi Irix 3
Sgi Irix 5
Sgi Irix 6.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 4
Sgi Irix 6.0.1
1 EDB exploit
NA
CVE-2004-0136
The mapelf32exec function call in IRIX 6.5.20 up to and including 6.5.24 allows local users to cause a denial of service (system crash) via a "corrupted binary."
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.23
Sgi Irix 6.5.24
Sgi Irix 6.5.25
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
Sgi Irix 6.5.22
NA
CVE-2004-0137
Unknown vulnerability in init for IRIX 6.5.20 up to and including 6.5.24 allows local users to cause a denial of service (system panic) as a result of "page invalidation issues."
Sgi Irix 6.5.20f
Sgi Irix 6.5.20m
Sgi Irix 6.5.22
Sgi Irix 6.5.23
Sgi Irix 6.5.24
Sgi Irix 6.5.25
Sgi Irix 6.5.21f
Sgi Irix 6.5.21m
NA
CVE-2000-0283
The default installation of IRIX Performance Copilot allows remote malicious users to access sensitive system information via the pmcd daemon.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.3f
Sgi Irix 6.5.4
NA
CVE-1999-0044
fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.
Sgi Irix 5.1
Sgi Irix 5.1.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.0.1
Sgi Irix 6.2
1 EDB exploit
NA
CVE-1999-0036
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.1
Sgi Irix 5.2
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.1
Sgi Irix 6.4
2 EDB exploits
NA
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
NA
CVE-1999-1120
netprint in SGI IRIX 6.4 and previous versions trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
Sgi Irix
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 5.3
Sgi Irix 6.0
Sgi Irix 6.0.1
Sgi Irix 6.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »