Vulnerabilities
Vulnerable Software
Sgi:  >> Irix  >> 6.5.20f  Security Vulnerabilities
Unknown vulnerability in nsd in SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, allows attackers to cause a denial of service (memory consumption).
CVSS Score
5.0
EPSS Score
0.005
Published
2003-08-18
The DNS callbacks in nsd in SGI IRIX 6.5.x through 6.5.20f, and possibly earlier versions, do not perform sufficient sanity checking, with unknown impact.
CVSS Score
5.0
EPSS Score
0.007
Published
2003-08-18
Safe.pm 2.0.7 and earlier, when used in Perl 5.8.0 and earlier, may allow attackers to break out of safe compartments in (1) Safe::reval or (2) Safe::rdo using a redefined @_ variable, which is not reset between successive calls.
CVSS Score
4.6
EPSS Score
0.001
Published
2002-12-11
The presence of the Distributed GL Daemon (dgld) service on port 5232 on SGI IRIX systems allows remote attackers to identify the target host as an SGI system.
CVSS Score
5.0
EPSS Score
0.014
Published
2001-02-16
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
CVSS Score
10.0
EPSS Score
0.013
Published
1999-01-28
The printers program in IRIX has a buffer overflow that gives root access to local users.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-05-01
The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID.
CVSS Score
2.1
EPSS Score
0.001
Published
1997-09-15
root privileges via buffer overflow in df command on SGI IRIX systems.
CVSS Score
7.2
EPSS Score
0.014
Published
1997-07-16
root privileges via buffer overflow in pset command on SGI IRIX systems.
CVSS Score
4.6
EPSS Score
0.005
Published
1997-07-16
root privileges via buffer overflow in eject command on SGI IRIX systems.
CVSS Score
7.2
EPSS Score
0.005
Published
1997-07-16


Contact Us

Shodan ® - All rights reserved