Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm aix 3.1 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2010-1039
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and previous versions; IBM VIOS 2.1, 1.5, and previous versions; NFS/ONCplus B.11.31_09 and previous versions on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote malicious...
Hp Nfs\\/oncplus
Ibm Aix 5.2.0
Ibm Aix 5.2.0.50
Ibm Aix 5.2.0.54
Ibm Aix 4.3
Ibm Aix 4.3.0
Ibm Aix 4.1.2
Ibm Aix 4.1.5
Ibm Aix 3.2.0
Ibm Aix 3.2.5
Ibm Aix 5.1l
Ibm Aix 5.2
Ibm Aix 4.3.1
Ibm Aix 4.3.2
Ibm Aix 4.1
Ibm Aix 4.1.3
Ibm Aix 4.2.1.12
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 5.1
Ibm Aix 5.1.0.10
Ibm Aix 430
1 EDB exploit
1000
VMScore
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
1000
VMScore
CVE-1999-0745
Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
Ibm Aix 3.2
Ibm Aix 3.2.5
Ibm Aix 2.2.1
Ibm Aix 3.1
Ibm Aix 3.2.4
1 EDB exploit
1000
VMScore
CVE-1999-0113
Some implementations of rlogin allow root access if given a -froot parameter.
Ibm Aix 3.2.5
Ibm Aix 3.2.4
Ibm Aix 3.1
Ibm Aix 3.2
1 EDB exploit
890
VMScore
CVE-1999-0048
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
Debian Netkit 0.07
Nec Ews-ux V
Nec Up-ux V
Ibm Aix 4.1
Nec Asl Ux 4800
Ibm Aix 3.1
Ibm Aix 4.2
760
VMScore
CVE-1999-0041
Buffer overflow in NLS (Natural Language Service).
Gnu Libc 5.0.9
Gnu Libc 5.2.18
Gnu Libc 5.3.12
Cray Unicos 9.0
Ibm Aix 3.2.5
Ibm Aix 4.2
Slackware Slackware Linux 3.1
Redhat Linux 4.0
Cray Unicos Max 1.3
Cray Unicos 9.2
Ibm Aix 4.1
Cray Unicos 1.5
2 EDB exploits
725
VMScore
CVE-1999-0115
AIX bugfiler program allows local users to gain root access.
Ibm Aix 3.1
Ibm Aix 3.2
Ibm Aix 3.2.4
Ibm Aix 3.2.5
1 EDB exploit
695
VMScore
CVE-2022-22351
IBM AIX 7.1, 7.2, 7.3, and VIOS 3.1 could allow a non-privileged trusted host user to exploit a vulnerability in the nimsh daemon to cause a denial of service in the nimsh daemon on another trusted host. IBM X-Force ID: 220396
Ibm Aix
Ibm Aix 7.3.0.0
Ibm Vios
Ibm Aix 7.3.0
Ibm Aix 7.2.5.100
Ibm Aix 7.2.5.1
Ibm Aix 7.2.5.0
668
VMScore
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
668
VMScore
CVE-1999-0337
AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled.
Ibm Aix 1.2.1
Ibm Aix 3.1
Ibm Aix 2.2.1
Ibm Aix 1.3
Ibm Aix 3.2
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »