accept no compromises
Showing 1 - 25 of 219 RSS Feed

Operating System: IRIX

Firewall Log Watch 1.4
Posted May 28, 2013
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release adds IPv6 support for ipfilter and includes fixes for the netfilter parser and forward DNS resolution.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux, ios
MD5 | b76bad368ea311677dabb0618ec6c8cf
XRIX SQL Injection
Posted Sep 17, 2012
Authored by FarbodEZRaeL

Sites designed by IRIX suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
systems | irix
MD5 | 877e3cd90d07f56639c226c8246a9cf1
Firewall Log Watch 1.3
Posted Nov 15, 2011
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release adds IPv6 support for netfilter, dns cache initialization, and ASA parser extensions.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
MD5 | fbb652f8bc9fd7b74c450b09def52234
Secunia Security Advisory 42874
Posted Jan 10, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SGI IRIX, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | irix
MD5 | d765e96ef2deb50237a52d698f756e8e
IRIX Local Kernel Memory Disclosure / Denial Of Service
Posted Jan 10, 2011
Authored by Neil Kettle

IRIX suffers from local kernel memory disclosure and denial of service vulnerabilities.

tags | advisory, denial of service, kernel, local, vulnerability
systems | irix
MD5 | 5e8c44e1fdd653228116afdf58f2702c
Firewall Log Watch 1.2
Posted Oct 11, 2010
Authored by Boris Wesslowski | Site kyb.uni-stuttgart.de

fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.

Changes: This release features extended netfilter and Cisco PIX/ASA parsers and large amounts of fixes.
tags | tool, web, firewall
systems | cisco, linux, unix, solaris, irix, bsd, hpux
MD5 | 7700443f706a90922245895e06c30d7b
rpc.pcnfsd Syslog Format String
Posted May 22, 2010
Authored by Rodrigo Rubira Branco

rpc.pcnfsd suffers from a syslog related format string vulnerability. IBM AIX versions 6.1.0 and below, IRIX 6.5 and HP-UX versions 11.11, 11.23 and 11.31 are all affected.

tags | advisory
systems | irix, aix, hpux
advisories | CVE-2010-1039
MD5 | 6a561a87ac3fe6bcbce97917f6ebcfbf
Irix LPD tagprinter Command Execution
Posted Oct 27, 2009
Authored by H D Moore

This Metasploit module exploits an arbitrary command execution flaw in the in.lpd service shipped with all versions of Irix.

tags | exploit, arbitrary
systems | irix
advisories | CVE-2001-0800
MD5 | aaac787725921154a9d2ef24eafe6599
IRIX-p_sh-asm.c
Posted Jun 14, 2007
Authored by Adam Zabrocki

IRIX MIPS processor shellcode. Tested on R12000 process with system IRIX64 6.5.26m.

tags | shellcode
systems | irix
MD5 | bd4058565fd6b72d4fcd8fb1644dcb55
prdelka-vs-SGI-xrunpriv
Posted Oct 27, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

SGI IRIX 6.5 /usr/sysadm/bin/runpriv local root exploit.

tags | exploit, local, root
systems | irix
MD5 | 4b1c2d6a99b7463829ce9ccb4d234784
irix6local.txt
Posted Mar 12, 2006
Authored by RoDhEDoR

SGI IRIX 6.5 local root exploit that makes use of /usr/sysadm/bin/lezririx.

tags | exploit, local, root
systems | irix
MD5 | accacb1a726b2b73f1a62b596bc361f3
iDEFENSE Security Advisory 2005-10-10.t
Posted Oct 11, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.10.05-1 - Local exploitation of a design error vulnerability in the runpriv command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.22 (maintenance). It is suspected that previous and later versions of both the feature and maintenance revisions of IRIX 6.5 are also vulnerable.

tags | exploit, arbitrary, local, root, code execution
systems | irix
advisories | CVE-2005-2925
MD5 | 7739b7bd8768ae74b99e57fdb64e6838
snaresquid-1.2.tar.gz
Posted Jul 19, 2005
Site intersectalliance.com

Snare for Squid provides a remote distribution facility for Squid proxy server logs, and is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Squid can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival.

tags | remote, local, system logging
systems | linux, unix, solaris, irix, aix
MD5 | d757c89e24ed354d7633893b8d607f93
snaretext-1.1.tar.gz
Posted Jul 19, 2005
Site intersectalliance.com

Snare for Apache provides a remote distribution facility for Apache Web server logs. It is known to run on most Unix variations, including Linux, Solaris, AIX, Tru64, and Irix. Snare for Apache can be used to send data to either a remote or local SYSLOG server, or the Snare Server for centralized collection, analysis, and archival.

tags | remote, web, local, system logging
systems | linux, unix, solaris, irix, aix
MD5 | 8c1cb82d5696977ffde02e978004e149
Secunia Security Advisory 15785
Posted Jun 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SGI has acknowledged a vulnerability in IRIX, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | irix
MD5 | 6a0edbd0189a31d0478a17ad21884b5f
Secunia Security Advisory 15619
Posted Jun 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in SGI IRIX, which potentially can be exploited by malicious users to disclose and modify sensitive information.

tags | advisory
systems | irix
MD5 | d2b66e3eee448134ab18bc5fed75b773
iDEFENSE Security Advisory 2005-04-07.2
Posted Apr 17, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 04.07.05 - Local exploitation of a file overwrite vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX operating system could allow for the overwriting of arbitrary files, regardless of permissions. The vulnerability specifically exists in the way that gr_osview opens user specified files without dropping privileges. When a file is specified using the -s option, it will be opened regardless of permissions, and operating system usage information will be written into it.

tags | advisory, arbitrary, local
systems | irix
advisories | CVE-2005-0465
MD5 | 2ade3a565b4f88b059495fd55d72ad72
iDEFENSE Security Advisory 2005-04-07.1
Posted Apr 17, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 04.07.05 - Local exploitation of an information disclosure vulnerability in the gr_osview command included in multiple versions of Silicon Graphics Inc.'s IRIX Operating System could allow for the disclosure of sensitive information such as the root user's password hash. The vulnerability specifically exists in the way that gr_osview opens user-specified description files without dropping privileges. When this is combined with the debug option, it is possible to dump a line from an arbitrary file, regardless of its protection.

tags | advisory, arbitrary, local, root, info disclosure
systems | irix
advisories | CVE-2005-0464
MD5 | 9cc19ad2bed67e14448de3c36652635b
Secunia Security Advisory 14875
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in SGI IRIX, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges and disclose some sensitive information.

tags | advisory, local, vulnerability
systems | irix
MD5 | 167ce1b0a5132f600d0fb93790cf2a17
iDEFENSE Security Advisory 2005-01-13.3
Posted Jan 16, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance).

tags | advisory, arbitrary, local, root, code execution
systems | irix
MD5 | cbe1d361d60f08214500dcd1d88bc0d1
NetBSD Security Advisory 2004.10
Posted Dec 30, 2004
Authored by Evgeny Demidov, The NetBSD Project | Site netbsd.org

NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall.

tags | advisory, kernel
systems | linux, netbsd, freebsd, irix, hpux
MD5 | 1caeb75665bcbb5ebf85d997096369d2
HexView Security Advisory 2004-06-01.01
Posted Jun 18, 2004
Authored by HexView, SGI Security Coordinator | Site support.sgi.com

SGI Security Advisory 20040601-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions non privileged users can use the syssgi system call SGI_IOPROBE to read and write kernel memory which can be used to obtain root user privileges. Patches have been released for this and other issues. At this time, IRIX versions 6.5.20 to 6.5.24 are considered susceptible.

tags | advisory, kernel, root
systems | irix
advisories | CVE-2004-0135, CVE-2004-0136, CVE-2004-0137
MD5 | d05cb4115b395162428966046c7e70a4
HexView Security Advisory 2004-05-07.01
Posted May 26, 2004
Authored by HexView | Site support.sgi.com

SGI Security Advisory 20040507-01-P - Adam Gowdiak from the Poznan Supercomputing and Networking Center has reported that under certain conditions the /usr/sbin/cpr binary can be forced to load a user provided library while restarting the checkpointed process which can then be used to obtain root user privileges. All versions of IRIX prior to 6.5.25 are affected.

tags | advisory, root
systems | irix
advisories | CVE-2004-0134
MD5 | bca7813ef568a2aec8061ef1c2246dda
HexView Security Advisory 2004-05-03.01
Posted May 18, 2004
Authored by HexView | Site sgi.com

SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x.

tags | advisory, denial of service
systems | irix
MD5 | e771b7ecc64247707f40f03dc5da3f98
lboeg.pl.txt
Posted May 1, 2004
Authored by BlackAngels | Site blackAngels.it

Local buffer overflow exploit generator for Linux, BSD, BSDi, HP-UX, UnixWare, IRIX and SCO.

tags | overflow, local
systems | linux, irix, bsd, hpux, unixware
MD5 | cb5cbdcd5c17d8e59d12c37a65fc4867
Page 1 of 9
Back12345Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    2 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close