exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 220 RSS Feed

Operating System: IRIX

h-93.sgi.irix.ordist.buffer.overrun.txt
Posted Sep 23, 1999

h-93.sgi.irix.ordist.buffer.overrun.txt

tags | overflow
systems | irix
SHA-256 | ff5a939fdf24fd62126256c0fe3ae8074ea50d5c43cb60ffc8edd7478ea76ed0
ciac.i-060.irix.dos
Posted Sep 23, 1999

ciac.i-060.irix.dos

tags | denial of service
systems | irix
SHA-256 | 66f2d2055388fb06dce4b091283e0e90d61257367eca069d34ee1620c354cd0d
ciac.i-061.sgi.irix.mediad.1m
Posted Sep 23, 1999

ciac.i-061.sgi.irix.mediad.1m

systems | irix
SHA-256 | b01864dbd8948e28b8aac8f3ada3b30a736f843e1861e61b04e4555ff838bc7a
ciac.i-062.irix.bind
Posted Sep 23, 1999

ciac.i-062.irix.bind

systems | irix
SHA-256 | 7ec1758b740b5d8be8b441312afdb727739208a4d5636894b11736df9b9d192a
i-015.sgi.irix.syserr.permissions.vulnerabilities.txt
Posted Sep 23, 1999

i-015.sgi.irix.syserr.permissions.vulnerabilities.txt

tags | vulnerability
systems | irix
SHA-256 | 76215a7b8661b1f2bc6d19e79dcc06c769f05c9b3a9acd86fb390cf0daeb5ff1
SNI-15.FAM.advisory
Posted Sep 23, 1999

Vulnerability information was determined using IRIX 6.2.

systems | irix
SHA-256 | 62164c3308d8cf718cf2a5680ee44edf52ed308430007f6dbabc9de897a44b86
VB-98.03.sgi_mailcap
Posted Sep 14, 1999

Information from Silicon Graphics Inc. regarding a vulnerability in IRIX 6.3 & 6.4 mailcap.

systems | irix
SHA-256 | ccbdab17349b5a0c7040cefcc1e63c8e6d09a4c8efd5820f4e3d0430921272a4
VB-97.07.sgi
Posted Sep 14, 1999

A Silicon Graphics Inc. Security Advisory addressing vulnerabilities in the IRIX webdist.cgi, handler, and wrap programs, part of the Outbox subsystem.

tags | cgi, vulnerability
systems | irix
SHA-256 | aff299b7b1077ec672db6025659ae4318b53ff82baf12d828c0ac5f8631d733c
VB-96.14.sgi
Posted Sep 14, 1999

Information from Silicon Graphics Inc. about vulnerabilities in the visual admin and user tool programs used in the IRIX operating systems versions 5.2, 5.3, 6.1, and 6.2. Patch information is included.

tags | vulnerability
systems | irix
SHA-256 | 4b8b818a4b9f888d71dea8e276f4385dcf50bc5d3d3c968213fd6617323ea70c
VB-96.08.sgi
Posted Sep 14, 1999

Information about a vulnerability in the IRIX 5.3, 6.1, and 6.2 operating systems regarding the permissions tool under the IRIX desktop environment.

systems | irix
SHA-256 | 9e614fd7f0fa0d1b2e4d38125c4870bc4ae75768f7f775cd3ddf74beb664f8dd
VB-96.02.sgi
Posted Sep 14, 1999

Vulnerability information on the "ATT Packaging Utility" and security measures to take on all SGI systems running IRIX 5.2, 5.3, 6.0, 6.0.1, and 6.1.

systems | irix
SHA-256 | c9923f804d7fa62f7c4b5506592717ec0d35b43435368a4a60b8e6b5ac632086
VB-95:02.sgi
Posted Sep 14, 1999

Vulnerability and patch information for the IRIX 5.2, 6.0, 6.0.1 Desktop Permissions Tool.

systems | irix
SHA-256 | 0390e56ff5e7ea0dd5ba6be34d0880d5c06e7cdb9de3a4cd9f9f3db8194dd8a9
CA-97.21.sgi_buffer_overflow
Posted Sep 14, 1999

In this advisory, we describe 6 buffer overflow problems in SGI IRIX systems. Problems affect the df, pset, eject, login/scheme, ordist, and xlock programs. Workarounds and a pointer to a wrapper are provided.

tags | overflow
systems | irix
SHA-256 | 507b41b12f9f7c3cd75d5ef7d05d4de4cfbf1f277839ecedbb79566b97219947
CA-97.15.sgi_login
Posted Sep 14, 1999

This advisory describes a vulnerability in the SGI login program when the LOCKOUT parameter is set to a number greater than zero. The vulnerability is present in IRIX 5.3 and 6.2, and perhaps other

systems | irix
SHA-256 | d2c6db2d376653840c625017a5427471d239965bb0e417c978479424dcf23966
CA-97.12.webdist
Posted Sep 14, 1999

This advisory reports a vulnerability in the webdist.cgi-bin program, part of the IRIX Mindshare Out Box package, available with IRIX 5.x and 6.x. When exploiting this vulnerability, both local and remote users may be able to execute arbitrary commands with the privileges of the httpd daemon. A workaround is included.

tags | remote, arbitrary, local, cgi
systems | irix
SHA-256 | c9926191ee769112046a977f04b676c47268e7100f13113682f3e542cb6b97c3
CA-97.03.csetup
Posted Sep 14, 1999

A vulnerability in the csetup program under IRIX versions 5.x, 6.0, 6.0.1, 6.1, and 6.2 allows local users to create or overwrite arbitrary files on the system and ultimately gain root privileges. A workaround is provided.

tags | arbitrary, local, root
systems | irix
SHA-256 | 416f58f59d17dbd153e723dbab1d8e7ed23d3fe6e91a316877ce82acaaaed8ab
CA-94:13.SGI.IRIX.Help.Vulnerability
Posted Sep 14, 1999

This advisory addresses a vulnerability in the Silicon Graphics, Inc. IRIX 5.x Help system. SGI recommends installing the patch, but has provided a workaround to disable the Help system if this is not possible.

systems | irix
SHA-256 | 8d7248f6fac2655a5318003eafe7fdf2301b1d7f0b36d8bd5173bcd79903934b
CA-92:08.SGI.lp.vulnerability
Posted Sep 14, 1999

A vulnerability is present in the default configuration of the lp software in Silicon Graphics Computer Systems (SGI) IRIX operating systems. This vulnerability is present in all versions of IRIX, prior to IRIX 4.0.5. The advisory describes how to reconfigure the lp software in order to eliminate this vulnerability.

systems | irix
SHA-256 | 0cf10a801a35d605f9982f7e3d5ee7402de464525ee955464d3b870e5dc1b96f
CA-91:14.IRIX.mail.vulnerability
Posted Sep 14, 1999

Vulnerability regarding the handling of mail messages on all Silicon Graphics IRIX Systems prior to version 4.0. The problem is fixed in version 4.0. Solution involves changing permissions and ownership of a system command.

systems | irix
SHA-256 | 26efe6baf0ecc4fafa8d8bf7992db1f6f331d9e9c7d0eee5d3357db53143eda3
CA-90:08.irix.mail
Posted Sep 14, 1999

Vulnerability in Silicon Graphics IRIX 3.3 and 3.3.1 systems. /usr/sbin/Mail has a security flaw.

systems | irix
SHA-256 | 0cc4b40026b2d95d4af0a2b715924cd689ab8c896c48cdde9a34f1e0a6c726cc
crh002.zip
Posted Aug 17, 1999
Authored by crh | Site codez.com

Second issue of the Confidence Remains High - Lots of news from the underground. Includes solaris exploits, scanning for and exploiting php.cgi, Hiding From Who, Sendmail 8.8.4 / 8.8.5 LOCAL Exploit, Ident Scanner (ident-scan.c), Windoze NT / 95 Killer : winnuke.c, Federal Bugging Frequencies, 911 Autodialler Script, Cellular Calls Without Cloning, Getting Your Exploits Onto Systems, Fakemailing Techniques, Pascal Credit Card Generator Source, in.courierd : backdoor on port 530, so1o Gets Busted by CERT, IRiX WWW Server Bugs, and Hacking Not-So-Electrical Items.

tags | local, cgi, php, magazine
systems | solaris, irix
SHA-256 | 24bd87efab7f86cf7db4471a62d21f17d4c284bee23cb0ffe064fce4f018c517
snoop2.c
Posted Aug 17, 1999
Authored by morpheus

Sn00py.c is a quick and dirty packet sniffer for SGI IRIX. This latest release of the super lightweight packet sniffer incorporates a 'depromiscuator' function to avoid setting off the IFF_PROMISC flag.

tags | tool, sniffer
systems | irix
SHA-256 | a9681774af5cffb916decc251ebbb88459e3147aed39a9abda4749c131d986fc
Sn00py.c
Posted Aug 17, 1999

IRIX packet sniffer.

tags | tool, sniffer
systems | irix
SHA-256 | 29c4a8184c2181bb25c96dff0627844f9d74a43ef819731838af2fce9574da72
snoop.c
Posted Aug 17, 1999
Authored by morpheus

A quick IRIX sniffer.

tags | tool, sniffer
systems | irix
SHA-256 | dd4e34143745204c5da3eb4abb432c57939e768265d72e78420a0c9b759b3fb4
sniffit.0.3.7.beta.tar.gz
Posted Aug 17, 1999
Site reptile.rug.ac.be

Sniffit 0.3.7beta - Very good packet sniffer for unix. Has an interactive mode where you can select connections in progress to watch, or a mode to log packets to a file in the background. Supports a configuration file and tpcdump like packet filtering. Sniffit runs on LINUX, SunOS, Solaris, FreeBSD and IRIX.

tags | tool, sniffer
systems | linux, unix, solaris, freebsd, irix
SHA-256 | 78b5137be45bdff738525dee351908ae0b8a79e2d999e33b34278a4a7fc08ca0
Page 8 of 9
Back56789Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close