Irix
by Sgi
Standard maintenance is sufficient
Irix has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
10.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
40.0%
Based on 10 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-1999-0039 | 7.3 | 20.7% | — |
| CVE-2001-0248 | 9.8 | 5.3% | — |
| CVE-2001-0249 | 9.8 | 4.7% | — |
| CVE-1999-0036 | 8.4 | 0.8% | — |
| CVE-1999-0059 | 7.3 | 0.7% | — |
| CVE-1999-0029 | 8.4 | 0.4% | — |
| CVE-2003-0174 | 9.8 | 0.4% | — |
| CVE-1999-0035 | 5.4 | 0.3% | — |
| CVE-1999-0022 | 7.8 | 0.2% | — |
| CVE-1999-0038 | 8.4 | 0.1% | — |
29
/ 100
low-risk
Active Threat
4/50 · Minimal
Exploit Availability
25/50 · Moderate
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.