Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
irix vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0473
Unknown vulnerability in the IPv6 capability in IRIX 6.5.19 causes snoop to process packets as the root user, with unknown implications.
Sgi Irix 6.5.19
NA
CVE-2003-0173
xfsdq in xfsdump does not create quota information files securely, which allows local users to gain root privileges.
Xfsdump Xfsdump 2.0.0
Xfsdump Xfsdump 2.0.2
Sgi Irix 6.5.1
Sgi Irix 6.5.10f
Sgi Irix 6.5.11
Sgi Irix 6.5.12m
Sgi Irix 6.5.13f
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
Sgi Irix 6.5.18
Sgi Irix 6.5.18m
Sgi Irix 6.5.19f
Sgi Irix 6.5.3
Sgi Irix 6.5.3m
Sgi Irix 6.5.6
Sgi Irix 6.5.6m
Sgi Irix 6.5.9
Sgi Irix 6.5.9m
Sgi Irix 6.5.11f
Sgi Irix 6.5.11m
Sgi Irix 6.5.12
Sgi Irix 6.5.12f
NA
CVE-2002-1419
The upgrade of IRIX on Origin 3000 to 6.5.13 up to and including 6.5.16 changes the MAC address of the system, which could modify intended access restrictions that are based on a MAC address.
Sgi Irix 6.5.13
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.14
NA
CVE-2002-1516
rpcbind in SGI IRIX, when using the -w command line switch, allows local users to overwrite arbitrary files via a symlink attack.
Sgi Irix 6.5.17
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.6
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.15
Sgi Irix 6.5.16
Sgi Irix 6.5.5
NA
CVE-2002-1517
fsr_efs in IRIX 6.5 allows local users to conduct unauthorized file activities via a symlink attack, possibly via the .fsrlast file.
Sgi Irix 6.5.13
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.8
Sgi Irix 6.5.9
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.4
Sgi Irix 6.5.6
Sgi Freeware 1.0
Sgi Irix 6.5.17
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.15
Sgi Irix 6.5.16
NA
CVE-2002-1518
mv in IRIX 6.5 creates a directory with world-writable permissions while moving a directory, which could allow local users to modify files and directories.
Sgi Irix 6.5
Sgi Irix 6.5.17m
Sgi Irix 6.5.2
Sgi Irix 6.5.3
Sgi Irix 6.5.4
Sgi Irix 6.5.10
Sgi Irix 6.5.12
Sgi Irix 6.5.16
Sgi Irix 6.5.17
Sgi Irix 6.5.5
Sgi Irix 6.5.13m
Sgi Irix 6.5.14
Sgi Irix 6.5.14m
Sgi Irix 6.5.15
Sgi Irix 6.5.9
Sgi Irix 6.5.7
Sgi Irix 6.5.1
Sgi Irix 6.5.11
Sgi Irix 6.5.13
Sgi Irix 6.5.15m
Sgi Irix 6.5.16m
Sgi Irix 6.5.6
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
NA
CVE-2003-0064
The dtterm terminal emulator allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the...
Sgi Irix 5.0
Sgi Irix 6.0.1
Sgi Irix 6.1
Sgi Irix 6.5.10m
Sgi Irix 6.5.11
Sgi Irix 6.5.13f
Sgi Irix 6.5.13m
Sgi Irix 6.5.16
Sgi Irix 6.5.16f
Sgi Irix 6.5.16m
Sgi Irix 6.5.2
Sgi Irix 6.5.2f
Sgi Irix 6.5.4m
Sgi Irix 6.5.5
Sgi Irix 6.5.7f
Sgi Irix 6.5.7m
Sgi Irix 6.5.8
Sgi Irix 5.0.1
Sgi Irix 5.1
Sgi Irix 6.2
Sgi Irix 6.3
Sgi Irix 6.4
NA
CVE-2002-2185
The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively di...
Sgi Irix 6.5.14m
Sgi Irix 6.5.15f
Sgi Irix 6.5.18m
Sgi Irix 6.5.2
Sgi Irix 6.5.9
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.16m
Sgi Irix 6.5.17f
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.13
Sgi Irix 6.5.14f
Sgi Irix 6.5.17m
Sgi Irix 6.5.18f
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.15m
Sgi Irix 6.5.16f
NA
CVE-2002-1786
SGI IRIX 6.5 up to and including 6.5.14 applies a umask of 022 to root core dumps, which allows local users to read the core dumps and possibly obtain sensitive information.
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Sgi Irix 6.5.1
Sgi Irix 6.5.14
Sgi Irix 6.5.3
Sgi Irix 6.5.11
Sgi Irix 6.5.12
Sgi Irix 6.5.13
Sgi Irix 6.5
Sgi Irix 6.5.2
Sgi Irix 6.5.4
Sgi Irix 6.5.9
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »